Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    File Transfer Using SFTP >>
    File Transfer Using Transparent FTP Tunneling >>
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages >>
        ssh-socks-proxy >>
        ssh-socks-proxy-config >>
        ssh-socks-proxy-ctl >>
        ssh-certview >>
        ssh-cmpclient >>
        ssh-keydist2 >>
        ssh-scepclient >>
    Log Messages >>


ssh-socks-proxy-ctl accepts the following commands:

  • status

    Display status and statistics for the running SOCKS Proxy.

  • list-connections

    Display a list of open connections.

  • list-channels

    Display of open connection channels.

  • list-keys

    Display of user private keys.

  • connection-status

    Display detailed connection status.

  • close-channel

    Close channel.

  • view-key

    Display detailed key information.

  • key-passphrase

    Prompt for user private key passphrase.

  • debug

    Modify the SOCKS Proxy debug output settings.

  • reload

    Reload the SOCKS Proxy configuration file.

  • stop

    Stop the SOCKS Proxy.

Additional per-command usage instructions are available by running:

ssh-socks-proxy-ctl <command> --help

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice

Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps