8-44
Catalyst 2928 Switch Software Configuration Guide
OL-23389-01
Chapter 8 Configuring Switch-Based Authentication
Configuring the Switch for Secure Copy Protocol
Information About Secure Copy
To configure Secure Copy feature, you should understand these concepts.
The behavior of SCP is similar to that of remote copy (rcp), which comes from the Berkeley r-tools suite,
except that SCP relies on SSH for security. SCP also requires that authentication, authorization, and
accounting (AAA) authorization be configured so the router can determine whether the user has the
correct privilege level.
A user who has appropriate authorization can use SCP to copy any file in the Cisco IOS File System
(IFS) to and from a switch by using the
copy
command. An authorized administrator can also do this
from a workstation.
For information about how to configure and verify SCP, see the “Secure Copy Protocol” section in the
Cisco IOS Security Configuration Guide: Securing User Services, Release 12.4
: