Datasheet
®
USER’S GUIDE
Vertical Console Port Server
90
Secure SHell (SSH) and Secure CoPy (SCP)
The Secure SHell (SSH) protocol provides a secure mechanism to access
computer consoles or shells remotely. The protocol authenticates the server
(in this case, the VCPS) and encrypts all transmissions between the SSH
client and the server.
• SSH is an alternative to Telnet, which does not provide encryption.
• SSH protects the username and password, the credentials for
authentication, from anyone intercepting network traffic.
• To authenticate the SSH server (the VCPS) to the SSH client, SSH
uses a host key that is unique to the SSH server and that provides an
identification that cannot be falsified. Therefore, an invalid server on
the network cannot obtain a user name and password from a user by
presenting itself as a valid server.
• The VCPS supports versions 1 and 2 of SSH.
• If you enable SSH, you should disable Telnet for a higher level of
security for your system.
• The interface, user accounts, and user access rights are the same
whether you access the control console through SSH or Telnet.
Secure CoPy (SCP) is a secure file transfer application that you can use
instead of FTP. SCP uses the SSH protocol as the underlying transport
protocol for encryption of user names, passwords, and files.
• When you enable and configure SSH, you automatically enable and
configure SCP. No further configuration of SCP is needed.
• If you enabled SSH and SCP, you should disable FTP for a higher level
of security for your system.
For information on supported SSH client applications, see
Telnet and SSH.