I know this is not a putty forum, but I thought that some of you may be using this. I am trying to use Putty pscp to transfer files to and from my routers. I can pull files from the router with no problem. When I try to push a file to the router, it will accept my credentials and I can look in the flash on the router and it shows the file as there, but after a minute the scp connection says "Fatal: Server unexpectedly closed network connection" and when I look in the flash on the router the file is gone. I have looked at the traffic on the ACL's and do not see anything hitting a deny statement. Any ideas why this is failing?
Here is a debug ip scp log when trying to push a file:
The Secure Copy (SCP) feature provides a secure and authenticated method for copying router configuration or router image files. SCP relies on Secure Shell (SSH), an application and a protocol that provide a secure replacement for the Berkeley r-tools.Check the configuration of SCP using the guide in the URL.
Rfer the following url for more information on scp config and usage with SSH:
I went by this document to set it up, and it is working for pulling files from the router, but when I try to push a file to the router it acts like it is working then just fails. As mentioned earlier there are no traces of failure in the debug logs....still no solution
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...