Your browser does not allow storing cookies. We recommend enabling them.


Managing Initial Configuration Blocks (ICBs)

ICB is a configuration file required by the Management Agent. It contains parameters for the initial connection to the Management Server. The ICB is created by the Management Server and should be delivered to the managed host along with the Management Agent installation package.

The ICB contains information for:

  • ICB identification (Identification)

  • the Management Server to connect to (Uplink0Host)

  • the management connection port to be used (Uplink0Port, default is 17235)

  • (optional) in each host view, a host group where this host should be grouped in the administration interface

The ICB contains sensitive information, such as agent authentication credentials, and should be transferred to the target host using secure methods. However, the authentication data is automatically changed when the host connects to the Management Server. An ICB can only be used to add new hosts to the Management Server.

The ICB is only required for the initial connection, after which the Management Agent builds a new configuration for itself. The ICB on the managed host is deleted after the router.dat configuration file is created.

You may have multiple ICBs for different host groups or purposes, and it is possible to set the default groups for the hosts using a certain ICB.

On AIX, HP-UX, Linux, and Solaris hosts, the default location where the Management Agent searches for the ICB is:


On Windows hosts, the default location is:

C:\Program Files\SSH Communications Security\Tectia Manager\icb.dat

ICBs are managed on the Manage ICBs page of the administration interface. To access the page, click Hosts → Manage ICBs on the menu. On this page, Valid ICBs and Expired ICBs are shown under separate tabs.

Managing ICBs

Figure 5.1. Managing ICBs




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now