Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Installing on Solaris

The downloaded online installation package contains the compressed installation files. On the CD-ROM, the installation packages for Solaris are located in directory /install/solaris/.

Two packages are required: one for common components of SSH Tectia ConnectSecure and SSH Tectia Server, and one for specific components of SSH Tectia ConnectSecure.

With SSH Tectia ConnectSecure you may choose to install:

  • the basic client package or the client-ft-only package without the sshg3 program

  • the optional capture package for FTP-SFTP conversion and transparent tunneling

  • the additional sdk package containing the file transfer APIs in C and Java.

SSH Tectia ConnectSecure includes support for Zones on Solaris 10. The SSH Tectia software can be installed into the global and local zones. When the SSH Tectia software is installed into the global zone, it becomes automatically installed also into the existing local zones. However, if the local zones are added into the system later, the SSH Tectia ConnectSecure needs to be separately installed on them.

In case you are installing SSH Tectia ConnectSecure into a sparse zone, note that the installation process will report a failure in creating symlinks. The actual installation is finished successfully, but you need to manually add the /opt/tectia/bin to the path settings.

For instructions on zones, see the Sun Microsystem documentation: System Administration Guide: Solaris Containers-Resource Management and Solaris Zones.

To install SSH Tectia ConnectSecure on Solaris, follow the instructions below:

  1. Select the installation package according to your Sun Solaris version.

    When installing on Solaris version 9 or 10 running on the SPARC architecture, use the packages named:


    When installing on Solaris version 10 running on the x86-64 architecture, use the packages named:


    In the commands, <component> refers to the software component, and <version> indicates the product release version and the current build number (for example,

  2. Unpack the installation packages to a suitable place. The standard place is /var/spool/pkg in Solaris environment. In the examples we use Solaris 10 x86-64. Run the following commands:

    $ uncompress ssh-tectia-common-<version>-solaris-10-x86_64.pkg.Z
    $ uncompress ssh-tectia-client-<version>-solaris-10-x86_64.pkg.Z
    $ uncompress ssh-tectia-capture-<version>-solaris-10-x86_64.pkg.Z
  3. Install the packages with the pkgadd tool with root privileges:

    # pkgadd -d ssh-tectia-common-<version>-solaris-10-x86_64.pkg all
    # pkgadd -d ssh-tectia-client-<version>-solaris-10-x86_64.pkg all
    # pkgadd -d ssh-tectia-capture-<version>-solaris-10-x86_64.pkg all
  4. (Optional) If you do not want to install the sshg3 command, unpack and install the client-ft-only package instead of the client package with root privileges:

    $ uncompress ssh-tectia-client-ft-only-<version>-solaris-10-x86_64.pkg.Z
    # pkgadd -d ssh-tectia-client-ft-only-<version>-solaris-10-x86_64.pkg all

    If you later need to start using the sshg3, you must first uninstall the client-ft-only package before you can install the client package.

  5. (Optional) With Solaris on the SPARC architecture, you have also the file transfer APIs in C and Java available. Install the SDK package with root privileges:

    $ uncompress ssh-tectia-sdk-<version>-solaris-9-10-sparc.pkg.Z
    # pkgadd -d ssh-tectia-sdk-<version>-solaris-9-10-sparc.pkg all
  6. Copy the license file to directory: /etc/ssh2/licenses. (This is not necessary in "third-digit" maintenance updates.) For information on licensing, see Licensing.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now