PurposeCommand or Action
Example:
Device(config)# aaa authorization exec default
group tacacs+
Establishes a username-based authentication system.
username name [privilege level] password
encryption-type encrypted-password
Step 6
You may omit this step if a network-based
authentication mechanism, such as TACACS+
or RADIUS, has been configured.
Note
Example:
Device(config)# username superuser privilege 2
password 0 superpassword
Enables SCP server-side functionality.ip scp server enable
Example:
Device(config)# ip scp server enable
Step 7
Exits global configuration mode and returns to privileged
EXEC mode.
exit
Example:
Device(config)# exit
Step 8
(Optional) Displays the SCP server-side functionality.show running-config
Example:
Device# show running-config
Step 9
(Optional) Troubleshoots SCP authentication problems.debug ip scp
Example:
Device# debug ip scp
Step 10
Configuration Examples for Secure Shell
Example: Secure Copy Configuration Using Local Authentication
The following example shows how to configure the server-side functionality of Secure Copy (SCP). This
example uses a locally defined username and password.
! AAA authentication and authorization must be configured properly in order for SCP to work.
aaa new-model
aaa authentication login default local
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1085
Configuration Examples for Secure Shell