[Contents] [Index] About This Document >> Installing SSH Tectia Server for IBM z/OS >> Getting Started with SSH Tectia Server for IBM z/OS >> Configuring the Server >> Configuring the Client >> Client Configuration Files>> Ciphers and MACs Compression Securing the Client >> Default ssh2_config Configuration File Authentication >> File Transfer Using SFTP >> File Transfer Using Transparent FTP Tunneling >> Tunneling on the Command Line >> Troubleshooting SSH Tectia Server for IBM z/OS >> Advanced Information >> Man Pages >> Log Messages >> Ciphers and MACs The Ciphers, MACs, and UseCryptoHardware configuration options have the same syntax in the ssh2_config client configuration file as they have in the sshd2_config server configuration file. For information on using the options, see Ciphers and MACs. [Contents] [Index] [ Contact Information | Support | Feedback | SSH Home Page | SSH Products ] Copyright © 2007 SSH Communications Security Corp. This software is protected by international copyright laws. All rights reserved.Copyright Notice