Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

SSH Tectia Configuration Profile Generation

After deploying SSH Tectia to all managed hosts, the administrators need to create appropriate SSH Tectia configuration files for the SSH Tectia Client, ConnectSecure, and Server hosts. This is done with the SSH Tectia Manager administration interface.

The configurations need to follow the guidelines set by the corporate security policy. The configurations will include, among other settings, the following parameters:

  • encryption algorithms

  • firewall settings

  • re-keying interval

  • authentication methods

The configurations related to the SSH Tectia software are made under tab SSH Tectia. The SSH Tectia configurations are further divided into two groups according to software category:

  • Client configurations (SSH Tectia Client and ConnectSecure configurations)

  • Server configurations (see Figure 5.4)

Editing SSH Tectia Server configuration in the administration interface

Figure 5.4. Editing SSH Tectia Server configuration in the administration interface

The administrator can view the configuration files prior to distributing them to the managed hosts.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now