Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server >>
    Getting Started >>
        Location of Installed Files >>
        Starting and Stopping the Server >>
        Operation of the Server >>
        SSH Tectia Server (T) >>
        SSH Tectia Server (A) >>
            Privileged Users
            Restricting Connections
            Verifying Configuration
        SSH Tectia Client >>
        Examples of Use
    Configuration >>
    Authentication >>
    Application Tunneling >>
    Troubleshooting >>
    Man Pages
    Advanced Options >>
    Log Messages >>

Verifying Configuration

Whenever changes are made to the SSH Tectia Server configuration, the server daemon has to be restarted in order for the changes to take affect.

The sshd-check-conf tool can be used to check what the configuration allows or denies based on the incoming username and/or hostname, for example:

/usr/local/sbin/sshd-check-conf root@
  Logins from[] allowed.
  Hostbased can be used from[].
  Login by root tunnel allowed.
  User root will not be chrooted.
  TCP forwarding by user root allowed.

Note: The tool is intended for validating user and host patterns in configuration options related to login. It does not validate all the possible configuration options. Please refer to the sshd-check-conf man page for detailed list of configuration options that can be checked with the tool.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now