[an error occurred while processing this directive]

HP OpenVMS Systems Documentation

Content starts here

Document Organization

 » Table of Contents

 » Glossary

 » Index

This guide describes how to configure, customize, manage, and use the Secure Shell software. It contains the following chapters and appendixes:

  • Chapter 1 introduces definitions and concepts that are important to understanding the Secure Shell (SSH).

  • Chapter 2 describes how to run the configuration procedure for SSH, how to configure the SSH server, and how to configure the SSH client.

  • Chapter 3 describes how to customize the SSH run-time environment to meet your organization's specific security needs.

  • Chapter 4 describes how to manage the SSH client and server.

  • Chapter 5 describes port forwarding with SSH.

  • Chapter 6 describes how to set up Kerberos security with SSH connections.

  • Chapter 7 describes SSH commands and utilities that you can use to invoke SSH, copy files, and manage keys.

  • Chapter 8 describes how to solve login problems.

  • Appendix A summarizes information about files and directories that the SSH client and server use.

  • Appendix B shows the systemwide SSH client and server files that the TCPIP$CONFIG utility generates during configuration.

  • Glossary describes some of the terms that are used in this manual.