Your browser does not allow storing cookies. We recommend enabling them.


Restricting Connections

Tectia Server can be configured to reject connection attempts from unknown hosts. For example the following allows connections only from the internal network IP addresses and from an external host with the IP address

  <connection action="allow">
      <ip address="" />
      <ip address="" />
  <connection action="deny" />

Using the Tectia Server Configuration GUI, the same settings can be made under the Connections and Encryption page, on the Selectors tab. See Editing Connection Rules.

For information on the selectors, see Using Selectors in Configuration File.

On systems with several network interfaces, Tectia Server can also be bound to a specific network interface so that the server can be only accessed from the intended network. For example, the following will bind the listener to address using the Secure Shell default port 22:

  <listener id="intranet" address="" />

Using the Tectia Server Configuration GUI, this can be set on the Network page. See Network.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now