Your browser does not allow storing cookies. We recommend enabling them.

SSH

Restarting the Server

Console

To restart the server under MVS when you are running it as a started task, use the following console command:

===> F SSHD2,RESTART

When the server is restarted, existing connections will stay open until they are disconnected. If you have made configuration changes, existing connections will continue to use the old configuration settings while new connections will use the reconfigured settings. To ensure that the new settings will be used for all new connections, use the Tectia sshg3 client option --exclusive. This way a new connection is opened for each connection attempt, instead of the Connection Broker reusing recently closed connections.

To kill existing connections and restart the server, use the restart command's force option:

===> F SSHD2,RESTART FORCE

User address spaces that were running before the stop will continue to run. Any changes to the configuration or keys will take effect when the daemon is restarted and when new user connections are established.

ISPF

To restart the server in ISPF, enter the Tectia SSH Assistant option 4.1.3 TSRVR (Restart the SSH server).

You should see the following console message:

 ISF031I CONSOLE <USERID> ACTIVATED
-F SSHD2,RESTART
 +SSZ0003I Command RESTART accepted

To kill existing connections and restart the server, enter the Tectia SSH Assistant option 4.1.4 TSRVRF (Restart the SSH server, killing connections).


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more