Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Authentication >>
    File Transfer Using SFTP >>
    Secure File Transfer Using Transparent FTP Security >>
        Introduction to Transparent FTP Security
        Configuring SOCKS Proxy >>
        Creating the SSHSP User
        Running SOCKS Proxy >>
        Using Public-Key Authentication with the SOCKS Proxy >>
        Configuring FTP >>
        Examples of Transparent FTP Security>>
            System-Wide Transparent FTP Tunneling or FTP-SFTP Conversion with Fallback
            JCL-Specific Transparent FTP Tunneling or FTP-SFTP Conversion
    Tunneling >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Man Pages and Default Configuration Files >>
    Log Messages >>

JCL-Specific Transparent FTP Tunneling or FTP-SFTP Conversion

In this example, transparent FTP tunneling or FTP-SFTP conversion is configured per FTP JCL job using a SYSFTPD DD statement.

Do the following steps:

  1. Copy the /opt/tectia/etc/ssh-socks-proxy-config-example.xml configuration file to /opt/tectia/etc/ssh-socks-proxy-config.xml.
  2. (FTP-SFTP conversion only) If you want to use FTP-SFTP conversion, edit the configuration file and change the value of the action attribute to "ftp-proxy":
         <rule ip-address=".*"
                 fallback-to-plain="NO" />
  3. Start the SOCKS Proxy if it is not already running.
  4. Create a new FTP configuration file EXAMPLE.SSHFTP.FTPDATA with the following contents:
  5. Create a new socks configuration dataset EXAMPLE.JCL.SOCKS.CONF with the following contents:
    sockd @=
  6. Modify your existing FTP JCL to use SOCKS by adding a SYSFTPD DD statement, for example:
    //FTP       EXEC PGM=FTP,PARM=' (EXIT=8'
    //SYSIN     DD  *
    userid   passwd
    get test.file 'USERID.FTP.TEST'

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2011 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now