This section lists the default locations where you will find the installed executables, configuration files, key files, the license file, and the user-specific configuration files after the installation phase.
The required file permissions (read and write rights) are also listed and marked:
MUST if security would be compromised if these permissions are incorrect.
SHOULD if security would not be compromised, but incorrect permissions would give away information.
Copyright 2010 SSH Communications Security Corp. This software is protected by international copyright laws. All rights reserved. Contact Information