Please provide more information in the discussion page.
To provide a secure CLI session with encryption to a Cisco switch an SSH or Secure Shell connection will be required as this uses a cryptographic network protocol that provides secure data communication.
Ftp is NOT a secure protocol. All usernames and passwords exchanged in setting up an FTP connection are sent in cleartext, data exchanged over and FTP connection is not encryption and the connection is subject to hijacking. A SFTP protocol however, is secure, thus your information is far safer.
Secure Sock Layer (SSL) is a encryption protocol that will keep your traveling data secure
Different from a connectionless protocol, a connection-oriented protocol guaranties the delivery of the information. An example of connection-oriented protocol is (TCP) and a connectionless protocol is (UDP). TCP is a connection-oriented protocol, it makes a connection and checks whether the data is received, and resends if it is not. UDP is a connectionless protocol, it does not guarantee delivery by first connecting and checking whether data is received.
L2TP is a tunneling protocol for an IP network. L2 data is transmitted over the network but has no encryption or authentication abilities. This type of protocol is usually paired with IPSec to provide encryption and authentication.
Connection oriented is more reliable because there is an acknowledgment received from data receiver (destination) that the data is receiving and transfer is successful which is not received from connection less protocol.
A reliable data transfer is one that is stable . For a reliable data transfer a connection oriented protocol is used. A connection oriented protocol is one that receives acknowledgement from the receiver before sending the further data.
connectionless protocols. A connection less protocol's lack of sophistication makes it more efficient than a connection-oriented protocol and renders it useful in situations in which data must be transferred quickly
The layer of the OSI Model that deals with encryption, would be the sixth layer, the presentation layer. It deals with the SSL/TLS protocol which pretty much just turns your regular HTTP (hypertext transfer protocol) into HTTPS (hypertext transfer protocol secure.) It adds an encryption to certain web pages that would deal with you credit card or any other private information dealt with.
Transmission Control Protocol (TCP) is used when data reliability is needed since it is connection oriented and guarantees delivery.
The transmission control protocol or TCP is used for connection oriented transmissions of data into a computer. The user datagram protocol or UDP is used to transmit simpler data into a computer.
Different from a connectionless protocol, a connection-oriented protocol guaranties the delivery of the information. An example of connection-oriented protocol is (TCP) and a connectionless protocol is (UDP). page/926 A+