Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
        Client Configuration Files
            Editing the Configuration Files
            Environment Variables
            Command-Line Options
        Ciphers and MACs
        Compression
        Securing the Client >>
        Default ssh2_config Configuration File
    Authentication >>
    File Transfer Using SFTP >>
    File Transfer Using Transparent FTP Tunneling >>
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages >>
    Log Messages >>

Client Configuration Files

The following files located in the /etc/ssh2 directory are used to store the client configuration information:

  • /etc/ssh2/ssh2_config: the global client configuration file
  • /etc/ssh2/ssh_ftadv_config: the global file transfer advisor profile configuration file
  • /etc/ssh2/ssh-socks-proxy-config.xml: the global SOCKS Proxy configuration file
  • /etc/ssh2/hostkeys: the global directory for known remote server host keys

The user-specific configurations are stored in each user's $HOME/.ssh2 directory:

  • $HOME/.ssh2/ssh2_config: the user-specific client configuration file
  • $HOME/.ssh2/ssh_ftadv_config: the user-specific file transfer advisor profile configuration file
  • $HOME/.ssh2/ssh-socks-proxy-config.xml: the user-specific SOCKS Proxy configuration file
  • $HOME/.ssh2/hostkeys: the user-specific directory for known remote server host keys
  • $HOME/.ssh2/identification: the identification file used with public-key authentication
  • $HOME/.ssh2/random_seed: the random number seed file for cryptographic operations

Editing the Configuration Files

Environment Variables

Command-Line Options

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now