Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server >>
    Getting Started >>
        Location of Installed Files >>
        Starting and Stopping the Server >>
        Operation of the Server >>
        SSH Tectia Server (T) >>
        SSH Tectia Server (A) >>
            Privileged Users
            Restricting Connections
            Verifying Configuration
        SSH Tectia Client >>
        Examples of Use
    Configuration >>
    Authentication >>
    Application Tunneling >>
    Troubleshooting >>
    Man Pages
    Advanced Options >>
    Log Messages >>

Verifying Configuration

Whenever changes are made to the SSH Tectia Server configuration, the server daemon has to be restarted in order for the changes to take affect.

The sshd-check-conf tool can be used to check what the configuration allows or denies based on the incoming username and/or hostname, for example:

/usr/local/sbin/sshd-check-conf root@
  Logins from[] allowed.
  Hostbased can be used from[].
  Login by root tunnel allowed.
  User root will not be chrooted.
  TCP forwarding by user root allowed.

Note: The tool is intended for validating user and host patterns in configuration options related to login. It does not validate all the possible configuration options. Please refer to the sshd-check-conf man page for detailed list of configuration options that can be checked with the tool.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice

Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps