Title and Copyright Information
 
About This Manual
Audience
Organization
Reader's Comments
Conventions
 
1    Secure Shell Overview
1.1    The Secure Shell Server
1.2    The Secure Shell Client
1.3    Server and Client Communication
 
2    Installing the Secure Shell Software
2.1    Downloading the Secure Shell Software
2.2    Installing the Secure Shell Software
2.3    Installing and Viewing the Secure Shell Documentation
2.4    Starting the Server Software
2.5    Uninstalling the Secure Shell Software
2.6    Removing the Secure Shell Documentation
2.7    Secure Shell Directories and Files
 
3    Configuring and Managing the Secure Shell Software
3.1    Configuring the Server
3.2    Configuring the Client
3.2.1    Configuring r* Commands to Use Secure Shell
3.3    User Authentication Methods
3.3.1    Password Authentication Method
3.3.2    Public Key Authentication Method
3.3.2.1    Configuring Public Key Authentication on the Client
3.3.2.2    Configuring Public Key Authentication on the Server
3.3.2.3    Logging In to the Server Using Public Key Authentication
3.3.2.4    Managing Passphrases
3.3.3    Host-Based Authentication Method
3.3.3.1    Configuring Host-Based Authentication
3.3.3.2    Connecting Using Host-Based Authentication
3.4    Managing the Server
3.4.1    Starting, Stopping, and Resetting the sshd2 Daemon
3.4.2    Generating A Host Key
3.4.3    Forwarding TCP/IP and X11 Data Through a Secure Shell Connection
3.4.3.1    TCP/IP Port Forwarding
3.4.3.2    X11 Forwarding
 
4    Using the Secure Shell Commands
4.1    Copying Files
4.1.1    Using the scp2 Command
4.1.2    Using the sftp2 Command
4.2    Logging In and Executing Commands on a Server
 
Examples
3-1    Sample sshd2_config File
3-2    Sample ssh2_config File
3-3    Public Key Authentication Login Output
 
Tables
1-1    Secure Shell Commands
3-1    sshd2_config Sections
3-2    ssh2_config Sections
 
Index