The method you use to implement secure file transfer depends on your security goals. The following table can help you choose the best security method for your needs:
|
Need to configure |
Need to configure |
Encrypts Login? |
Encrypts Command Channel? |
Encrypts File Transfer? |
Encrypts Actual File? |
SSL |
Y |
Y |
Y |
Y |
Y |
N |
SSH |
Y |
Y |
Y |
Y |
Y |
N |
OpenPGP |
Y |
N |
N |
N |
N |
Y |
Note: With both SSL and SSH, check with the FTP server Administrator to confirm the server type that is running at the address you want to post files to. If you do not know the server type and attempt to make an SSL or SSH connection to a server that does not support the necessary protocols, the connection will fail.
In This Section |
See Also |