[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
Configuring SSH Host Keys for Secure Copy
Secure Shell (SSH) uses encryption algorithms to
generate a host, server, and session key system that ensures secure
data transfer. You can configure SSH host keys to support secure copy
(SCP) as an alternative to FTP for the background transfer of data
such as configuration archives and event logs. To configure SSH support
for SCP, you must complete the following tasks:
- Specify SSH known hosts by including hostnames and host
key information in the Routing Engine configuration hierarchy.
- Set an SCP URL to specify the host from which to receive
data. Setting this attribute automatically retrieves SSH host key
information from the SCP server.
- Verify that the host key is authentic.
- Accept the secure connection. Accepting this connection
automatically stores host key information in the local host key database.
Storing host key information in the configuration hierarchy automates
the secure handshake and allows background data transfer using SCP.
This section contains the following topics:
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]