•
If you get CLI error messages after entering the
crypto key generate rsa
global configuration command,
an RSA key pair has not been generated. Reconfigure the hostname and domain, and then enter the
crypto key generate rsa
command. For more information, see Related Topics below.
•
When generating the RSA key pair, the message No host name specified might appear. If it does, you
must configure a hostname by using the
hostname
global configuration command.
•
When generating the RSA key pair, the message No domain specified might appear. If it does, you must
configure an IP domain name by using the
ip domain-name
global configuration command.
•
When configuring the local authentication and authorization authentication method, make sure that AAA
is disabled on the console.
Related Topics
Setting Up the Switch to Run SSH, on page 117
Configuring the Switch for Local Authentication and Authorization, on page 107
Secure Copy Protocol Overview
The Secure Copy Protocol (SCP) feature provides a secure and authenticated method for copying switch
configurations or switch image files. SCP relies on Secure Shell (SSH), an application and a protocol that
provides a secure replacement for the Berkeley r-tools.
For SSH to work, the switch needs an RSA public/private key pair. This is the same with SCP, which relies
on SSH for its secure transport.
Because SSH also relies on AAA authentication, and SCP relies further on AAA authorization, correct
configuration is necessary.
•
Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the switch.
•
Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and Adelman
(RSA) key pair.
When using SCP, you cannot enter the password into the copy command. You must enter the password
when prompted.
Note
Secure Copy Protocol
The Secure Copy Protocol (SCP) feature provides a secure and authenticated method for copying switch
configurations or switch image files. The behavior of SCP is similar to that of remote copy (rcp), which comes
from the Berkeley r-tools suite, except that SCP relies on SSH for security. SCP also requires that authentication,
authorization, and accounting (AAA) authorization be configured so the switch can determine whether the
user has the correct privilege level. To configure the Secure Copy feature, you should understand the SCP
concepts.
Related Topics
Prerequisites for Configuring Secure Shell, on page 113
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
116
OL-29048-01
Configuring Secure Shell (SSH)
Secure Copy Protocol Overview