9-53
Catalyst 2960 and 2960-S Switch Software Configuration Guide
OL-8603-09
Chapter 9 Configuring Switch-Based Authentication
Configuring the Switch for Secure Copy Protocol
Information About Secure Copy
To configure the Secure Copy feature, you should understand these concepts.
The behavior of SCP is similar to that of remote copy (rcp), which comes from the Berkeley r-tools
suite, except that SCP relies on SSH for security. SCP also requires that authentication, authorization,
and accounting (AAA) authorization be configured so the router can determine whethe r the user has the
correct privilege level.
A user who has appropriate authorization can use SCP to copy any file in the Ci sco IOS File System
(IFS) to and from a switch by using the copy command. An authorized administrator can also do this
from a workstation.
For information about how to configure and verify SCP, see the “Secure Copy Protocol” section in the
Cisco IOS Security Configuration Guide: Securing User Services, Release 12.4 :
http://www.cisco.com/en/US/docs/ios/sec_user_services/configuration/guide/sec_secure_copy_ps6350
_TSD_Products_Configuration_Guide_Chapter.html