Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server >>
    Getting Started >>
        Location of Installed Files
            Configuration Files
            Key Files
            License File
        Starting and Stopping the Server >>
        Operation of the Server >>
        SSH Tectia Server (T) >>
        SSH Tectia Server (A) >>
        SSH Tectia Client >>
        Examples of Use
    Configuration >>
    Authentication >>
    Application Tunneling >>
    Troubleshooting >>
    Man Pages
    Advanced Options >>
    Log Messages >>

Location of Installed Files

The system-wide configuration files, key files, and the license file are located in the /etc/ssh2 directory. The server daemon uses this location by default. An alternate location can be specified with the -f flag on the command line.

System binaries such as sshd2 and ssh-certd are stored in /usr/local/sbin and library binaries are stored in /usr/local/libexec. User binaries such as ssh2 and sftp2 are stored in /usr/local/bin.

The installation script creates symbolic links, so that sshd points to sshd2 and ssh points to ssh2. If you also have Secure Shell 1.x installed, the SSH Tectia Server installation process modifies the existing link. The old versions can be run with the commands sshd1 and ssh1.

Configuration Files

Key Files

License File

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now