Support for SCP

The Secure Copy Protocol (SCP) is derived from Secure Shell version 2 (SSH2.0). A user on an SCP client must enter a correct user name, password, and private key for authentication before establishing a connection with an SCP server. After being authenticated, the client can remotely manage file transfer using SCP. The system encrypts user data using a negotiated session key.

An attacker does not have the correct private key or password and therefore fails to be authenticated. In addition, the attacker cannot decrypt data or obtain a session key even though the attacker intercepts data exchanged between clients and the server. Only specified clients and the server can decrypt data exchanged between one another, ensuring secure data transmission on the network.

Devices support the following SCP functions:

Figure 1 SCP networking diagram

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >