SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
The following general features are available with all products of the SSH Tectia client/server solution.
The SSH Tectia client/server solution implements the Secure Shell (version 2) protocol as defined by the IETF Proposed Standard RFC specifications. SSH Communications Security is the original developer of Secure Shell and has been an active driver of the Secure Shell standardization in the IETF.
The SSH Tectia client/server solution offers state-of-the-art encryption with broad support for symmetric ciphers including 3DES, AES, Arcfour, Blowfish, SEED, and Twofish. Supported message authentication and public-key algorithms include MD5, SHA-1, Diffie-Hellman, DSA, and RSA.
The SSH Tectia products include versatile command-line tools that can be used for remote login, remote command execution, and file transfer operations. These tools allow easy scripting of automated jobs such as secure file transfers or starting and stopping of services in remote locations.
One of the key features of Secure Shell in addition to secure terminal access and secure file transfers is its ability to tunnel TCP-based application connections. The SSH Tectia products allow static application tunneling where application client connections are routed through the local TCP port, and then securely tunneled to a remote Secure Shell server.
Before an application can be tunneled, a Secure Shell connection needs to be established. When using the automatic tunneling feature, the SSH Tectia client-side component listens to a specific port and establishes the encrypted connection automatically when the specific application is connecting to the local host port.
The SSH Tectia products support SOCKS (4 and 5) and HTTP proxy for accessing Secure Shell servers located behind firewalls.
Multi-channel support allows users to have multiple terminal sessions, file transfers, and application tunnels that are multiplexed to a single Secure Shell connection without the need to authenticate every session separately.
Administrators can configure the renewal period for session encryption keys according to the security requirements.