Scp Protocol Support; Scp Configuration; Radius Authentication - Avaya G250 Administration

Media gateways
Hide thumbs Also See for G250:
Table of Contents

Advertisement

SCP protocol support

In addition to data transfer via an SSH session, the SSH protocol is used to support SCP for
secure file transfer. When using SCP, the G250/G350 is the client, and an SCP server must be
installed on the management station. After users are defined on the SCP server, the G250/
G350 acts as an SCP client.
The process of establishing an SCP session is the same process as described in
support
on page 45, except that the roles of the G250/G350 and the client computer are
reversed.
To perform file transfers secured by SCP, the G250/G350 launches a local SSH client via the
CLI. This establishes a secured channel to the secured file server. The G250/G350
authenticates itself to the server by providing a user name and password. With a
Windows-based SSH server (WinSSHD), the user name provided must be a defined user on
the Windows machine with read/write privileges. The files transferred via SCP are saved in the
C:\Documents and Settings\username directory.
The network element performs file transfer in unattended mode.

SCP Configuration

Use the clear ssh-client known-hosts command to clear the client's list of SCP server
fingerprints. Each SCP client maintains a list of server fingerprints. If a key changes, the client's
verification of the server's fingerprint will fail, thereby preventing the client's access to the SCP
server. If this happens, you can use the clear ssh-client known-hosts command to
erase the client's server fingerprint list. This enables the client to access the server and begin to
recreate its list of fingerprints with the SCP server's new fingerprint.

RADIUS authentication

If your network has a RADIUS server, you can configure the G250/G350 to use RADIUS
authentication. A RADIUS server provides centralized authentication service for many devices
on a network. When you use RADIUS authentication, you do not need to configure usernames
and passwords on the G250/G350. When you try to access the G250/G350, the G250/G350
searches for your username and password in its own database first. If it does not find them, it
activates RADIUS authentication.
For additional information on RADIUS configuration and authentication, go to the Avaya web
site at http://www.avaya.com/support, and perform a search for the document Avaya G700/
G350 RADIUS Configuration Overview.
Managing login permissions
SSH protocol
Issue 3 February 2007
47

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents