Secure shell and secure copy – HP 445946-001 User Manual

Page 30

Advertising
background image

Accessing the switch

30

e.

Configure custom privilege-level mapping (optional). Click Submit to accept each mapping

change.

2.

Apply, verify, and save the configuration.

Secure Shell and Secure Copy

Secure Shell (SSH) and Secure Copy (SCP) use secure tunnels to encrypt and secure messages between a
remote administrator and the switch. Telnet does not provide this level of security. The Telnet method of

managing a switch does not provide a secure connection.
SSH is a protocol that enables remote administrators to log securely into the switch over a network to

execute management commands. By default, SSH is disabled (off) on the switch.
SCP is typically used to copy files securely from one machine to another. SCP uses SSH for encryption of

data on the network. On a switch, SCP is used to download and upload the switch configuration via

secure channels. By default, SCP is disabled on the switch.

Advertising