Your browser does not allow this site to store cookies and other data. Some functionality on this site may not work without them. See Privacy Policy for details on how we would use cookies.

SSH Tectia

SSH Tectia® Client 6.0

User Manual

SSH Communications Security Corp.

This software is protected by international copyright laws. All rights reserved. ssh® and Tectia® are registered trademarks of SSH Communications Security Corp in the United States and in certain other jurisdictions. The SSH and Tectia logos are trademarks of SSH Communications Security Corp and may be registered in certain jurisdictions. All other names and marks are property of their respective owners.

No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corp.

THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.

For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the Product Description.

15 May 2009


Table of Contents

1. About This Document
Documentation Conventions
Operating System Names
Directory Paths
Customer Support
Component Terminology
2. Installing SSH Tectia Client
Preparing for Installation
System Requirements
Hardware and Disk Space Requirements
Licensing
Installation Packages
Upgrading Previously Installed SSH Tectia Client Software
Downloading SSH Tectia Releases
Installing the SSH Tectia Client Software
Installing on AIX
Installing on HP-UX
Installing on Linux
Installing on Solaris
Installing on Windows
Installing on VMware ESX
Installing on Linux on IBM System z
Removing the SSH Tectia Client Software
Removing from AIX
Removing from HP-UX
Removing from Linux
Removing from Solaris
Removing from Windows
Removing from VMware ESX
Removing from Linux on IBM System z
Files Related to SSH Tectia Client
File Locations on Unix
File Locations on Windows
Registry Keys on Windows
3. Getting Started with SSH Tectia Client
Product Components
First Login to a Remote Host
Logging in with SSH Tectia Terminal GUI (Windows)
Logging in with Command-Line sshg3
Using Public-Key Authentication
SSH Tectia Shortcut Menu (Windows)
SSH Tectia Status Dialog Box (Windows)
4. Configuring Connection Broker
Configuration File for Connection Broker
SSH Tectia Configuration Tool (Windows)
Defining General Settings
Defining Connection Profiles
Defining User Authentication
Defining Server Authentication
Defining Transparent Tunnels
Defining Automatic Tunnels
Backup of Configuration Files
5. Authentication
Server Authentication with Public Keys
Host Key Storage Formats
Using the System-Wide Host Key Storage
Resolving Hashed Host Keys
Using the OpenSSH known_hosts File
Server Authentication with Certificates
Using the Configuration File (Unix)
Using the GUI (Windows)
User Authentication with Passwords
Using the Configuration File (Unix)
Using the GUI (Windows)
User Authentication with Public Keys
Creating Keys with ssh-keygen-g3
Uploading Public Keys Manually
Creating Keys with the Key Generation Wizard (Windows)
Uploading Public Keys Automatically (Windows)
Using Keys Generated with OpenSSH
Special Considerations with Windows Servers
User Authentication with Certificates
Using the Configuration File (Unix)
Using the GUI (Windows)
Host-Based User Authentication (Unix)
User Authentication with Keyboard-Interactive
Using the Configuration File (Unix)
Using the GUI (Windows)
User Authentication with GSSAPI
Using the Configuration File (Unix)
Using the GUI (Windows)
6. Transferring Files
Secure File Transfer with scpg3 and sftpg3 Commands
Using scpg3
Using sftpg3
Secure File Transfer GUI (Windows)
Defining File Transfer GUI Settings
Downloading Files with the File Transfer GUI
Uploading Files with the File Transfer GUI
Transfer and Queue Tabs
Defining File Properties
Differences from Windows Explorer
7. Secure Shell Tunneling
Local Tunnels
Transparent TCP Tunneling
Non-Transparent TCP Tunneling
Non-Transparent FTP Tunneling
SOCKS Tunneling
Remote Tunnels
X11 Forwarding
Agent Forwarding
8. Troubleshooting SSH Tectia Client
Starting Connection Broker in Debug Mode
Answers to Common Problems
A. Configuring SSH Tectia Terminal and File Transfer GUI (Windows)
Defining Global Settings
Defining the Appearance
Selecting the Font and Terminal Window Size
Selecting Colors
Defining Messages
Defining File Transfer Settings
Defining Advanced File Transfer Options
Defining File Transfer Mode
Defining Local Favorites
Defining Security Settings
Printing
Using Command-Line Options
Customizing the User Interface
Saving Settings
Loading Settings
Customize Dialog
Customizing Toolbars
B. Broker Configuration File Syntax
C. Command-Line Tools and Man Pages
ssh-broker-g3 - SSH Connection Broker - Generation 3
ssh-broker-ctl - SSH Tectia Connection Broker control utility
sshg3 - Secure Shell terminal client - Generation 3
scpg3 - Secure Shell file copy client - Generation 3
sftpg3 - Secure Shell file transfer client - Generation 3
ssh-keygen-g3 - authentication key pair generator
ssh-cmpclient-g3 - CMP enrollment client
ssh-scepclient-g3 - SCEP enrollment client
ssh-certview-g3 - certificate viewer
ssh-ekview-g3 - external key viewer
D. Egrep Syntax
Egrep Patterns
Escaped Tokens for Regex Syntax Egrep
Character Sets For Egrep
E. Audit Messages
Index

===AUTO_SCHEMA_MARKUP===