Your browser does not support HTML5 local storage or you have disabled it. Some functionality on this site, including saving your privacy settings and offering you special discounts, uses local storage and may not work with local storage disabled. We recommend allowing the use of local storage in your browser. In some browsers, it is the same setting used for disabling cookies.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server (M) >>
    Using SSH Tectia Server (M) >>
    Troubleshooting SSH Tectia Server (M) >>
    Configuration >>
        Configuration Files
            Modifying Configuration Files
            Command-Line Options
        Subconfigurations >>
        Ciphers and MACs
        Compression
        Configuring Root Logins
        Restricting User Logins
        Subsystems
        Auditing >>
        Securing SSH Tectia Client and Server >>
    Authentication >>
    Application Tunneling >>
    Sample Files >>
    Man Pages
    Log Messages >>

Configuration Files

SSH Tectia Server (M) uses the following files to store configuration information:

  • sshd2_config (server configuration file)
  • ssh_certd_config (configuration file for the certificate validation daemon)
  • hostkey (default host private key)
  • hostkey.pub (default host public key)

In addition, the file /etc/ssh2/random_seed, which contains the seed for cryptographic operations, will be created by the server.

Modifying Configuration Files

Command-Line Options

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2005 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice

===AUTO_SCHEMA_MARKUP===