Your browser does not allow storing cookies. We recommend enabling them.

SSH

Setting the Debug Level

Setting the Debug Level in the Console

When sshd2 is run as a started task, the debug level of the running server can be set using the z/OS console modify command debug.

To set the debug level of the running server, issue the following command (where debuglevel is a number from 1 to 99 indicating the level of diagnostics information required) from the z/OS console:

===> F SSHD2,DEBUG debuglevel

For example, to set debug level 4 (which is in most cases sufficient):

===> F SSHD2,DEBUG 4

To disable server debug, set debug level to 0 as follows:

===> F SSHD2,DEBUG 0

Setting the Debug Level in ISPF

To set the debug level of the server in ISPF, enter the Tectia SSH Assistant option 4.1.6 TSRVTR (Turn trace on or off in the running SSH server).

The trace level is a number which directs the server to produce diagnostic trace information on restart. Enter a trace level number in the Options field provided.

Trace level 2 provides user-oriented messages.

To disable server debug, set trace level number to 0.

Tectia SSH Assistant ISPF application - Turn trace on or off in the running SSH server (4.1.6 TSRVTR)

Figure 10.1. Tectia SSH Assistant ISPF application - Turn trace on or off in the running SSH server (4.1.6 TSRVTR)


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more