Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

SAP GUI Traffic through Transparent TCP Tunneling

Once the new configurations are deployed, the SSH Tectia Client software on the workstations transparently captures the SAP GUI traffic and forwards it in an authenticated and encrypted tunnel to the SSH Tectia Server software running on the SAP Application Server. See Figure 5.18.

SSH Tectia Server then decrypts the traffic and forwards it to the SAP Server software on the server host. All return traffic is also routed through the tunnel. No configuration changes need to be made in the SAP software running on the workstations or on the SAP Application Server host. Connections other than those defined in the SAP application definition are not affected and they are transmitted as plaintext.

SAP GUI traffic secured with the SSH Tectia managed security middleware

Figure 5.18. SAP GUI traffic secured with the SSH Tectia managed security middleware

SSH Tectia Server status monitoring and log gathering are described in SSH Tectia Server Status Monitoring and Log Gathering.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now