Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    File Transfer Using SFTP >>
    File Transfer Using Transparent FTP Tunneling >>
        Configuring SOCKS Proxy >>
        Creating the SSHSP User
        Running SOCKS Proxy >>
            Starting ssh-socks-proxy Manually under USS
            Running ssh-socks-proxy as a Started Task
            Stopping ssh-socks-proxy
            Reconfiguring ssh-socks-proxy
        Using Public-Key Authentication with the SOCKS Proxy >>
        Configuring FTP >>
        Examples of Transparent FTP Tunneling>>
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages >>
    Log Messages >>

Running ssh-socks-proxy as a Started Task

To run SSH Tectia SOCKS Proxy as a started task, you can use the job SSHSP from SAMPLIB (shown below). Before running the job, you need to create a user for running the task as described in Section Creating the SSHSP User.

SSHSP:

//SSHSP   PROC F=CONSOLE
//SSHFTP  EXEC PGM=BPXBATSL,
//             REGION=0M,
//             TIME=NOLIMIT,
//             PARM='PGM /usr/lpp/ssh2/sbin/ssh-socks-proxy --&F'
//STDENV   DD  DSN=&SYSUID..SSZ.SAMPLIB(SSHENV),
//             DISP=SHR
//STDOUT   DD  PATH='/u/&SYSUID/sshftp.stc.stdout',
//             PATHOPTS=(OWRONLY,OCREAT,OTRUNC),
//             PATHMODE=(SIRUSR,SIWUSR)
//STDERR   DD  PATH='/u/&SYSUID/sshftp.stc.stderr',
//             PATHOPTS=(OWRONLY,OCREAT,OTRUNC),
//             PATHMODE=(SIRUSR,SIWUSR)
//STDIN    DD  DUMMY
//        PEND

Start the SOCKS Proxy with the following operator command:

== > s sshsp 

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now