Your browser does not allow storing cookies. We recommend enabling them.

SSH

Connecting via Different TCP/IP Stacks with Tectia Clients

Note that running multiple Tectia clients simultaneously under the same user ID using different TCP/IP stacks will not work, because they use the same run-on-demand Connection Broker. The Connection Broker opens a socket on a particular TCP/IP stack; the clients (sftpg3, scpg3, sshg3) use local UNIX sockets to the Connection Broker.

If you want the clients to open connections to particular stacks, you have to run separate Connection Brokers on each stack, defined using the _BPXK_SETIBMOPT_TRANSPORT environment variable:

> env _BPXK_SETIBMOPT_TRANSPORT=TCPIPB ssh-broker-g3 -a /tmp/ssh-usernameB/ssh-broker

The ssh-broker-g3 option -a starts the Connection Broker so that it listens to the Connection Broker connections on the local address /tmp/ssh-usernameB/ssh-broker. If the /tmp/ssh-usernameB/ directory does not already exist, you have to first create it:

> mkdir /tmp/ssh-usernameB
[Note]Note

If you want to set the TCP/IP stack permanently, you can do it by setting the _BPXK_SETIBMOPT_TRANSPORT environment variable to the stack name in the client's .profile file.

Use the SSH_SECSH_BROKER environment variable to point to the UNIX socket the Connection Broker is listening on:

> env SSH_SECSH_BROKER=/tmp/ssh-usernameB/ssh-broker sshg3 User@Server

You can use the netstat command to display all active connections for TCPIPB:

> netstat -a -p TCPIPB


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more