To upload or download files between two devices or between a device and a host, you can use the console port, File Transfer Protocol (FTP), Secure Copy Protocol (SCP), Trivial File Transfer Protocol (TFTP), Secure File Transfer Protocol (SFTP), or FTP over Secure Sockets Layer (FTPS). The device and host can function as the server or client during file transfer. Table 1 describes the application scenarios, advantages, and disadvantages of each file transfer mode. You can select one mode based on actual requirements. For details about the file transfer modes, see "File Management" in the Configuration Guide - Basic Configuration of the corresponding product version.
File Transfer Mode |
Application Scenario | Advantage | Disadvantage |
---|---|---|---|
Console port | The console port can be used when no network environment is available or the switch's management interface is faulty or cannot be logged in to. This mode is implemented using the switch's BootROM or BootLoad menu. |
|
The file transfer speed is low. |
FTP | FTP can be used when security requirements are low; for example, during version upgrades. |
|
FTP transmits data in plain text, resulting in potential security risks. |
TFTP | TFTP can be used when the client and server do not need complex interactions, for example, online version uploads or upgrades on a lab local area network (LAN) in good conditions. |
TFTP consumes fewer memory resources than FTP. |
TFTP transmits data in plain text and does not provide authorization and authentication functions. There are potential security risks because the devices are prone to viruses and network attacks. |
SFTP | SFTP can be used when security requirements are high; for example, log downloads and configuration file backups. |
SFTP performs high-security encryption and integrity checks for data. |
SFTP is complex to configure. |
SCP | SCP can be used when security and performance requirements are high. |
|
SCP is complex to configure (similar to SFTP). |
FTPS | FTPS can be used when security and performance requirements are high. |
FTPS uses data encryption, identity authentication, and message integrity checks to ensure security of TCP-based application layer protocols. |
FTPS is complex to configure and requires Certificate Authority (CA)-issued certificates. |