Title and Copyright Information
 
About This Manual
Audience
Organization
Reader's Comments
Conventions
 
1    Secure Shell Overview
1.1    The Secure Shell Server
1.2    The Secure Shell Client
1.3    Server and Client Communication
 
2    Installing the Secure Shell Software
2.1    Downloading the Secure Shell Software
2.2    Upgrading the Secure Shell Software
2.3    Installing the Secure Shell Software
2.4    Installing and Viewing the Secure Shell Documentation
2.5    Starting the Server Software
2.6    Secure Shell Directories and Files
2.7    Deinstalling the Secure Shell Software
2.8    Removing the Secure Shell Documentation
 
3    Configuring and Managing the Secure Shell Software
3.1    Configuring the Server
3.2    Configuring the Client
3.2.1    Configuring Network Commands to Use Secure Shell
3.3    Configuring User Authentication
3.3.1    Configuring Password Authentication
3.3.2    Configuring Public Key Authentication
3.3.2.1    Configuring Public Key Authentication on the Client
3.3.2.2    Configuring Public Key Authentication on the Server
3.3.2.3    Accessing a Remote Server
3.3.2.4    Restricting User Access
3.3.2.5    Managing Passphrases
3.3.3    Configuring Host-Based Authentication
3.4    Managing the Server
3.4.1    Starting, Stopping, Restarting, and Resetting the sshd2 Daemon
3.4.2    Restricting Users to Home Directories
3.4.3    Creating a Public and Private Host Key
3.4.4    Forwarding TCP/IP and X11 Data Through a Secure Shell Connection
3.4.4.1    TCP/IP Port Forwarding
3.4.4.2    X11 Forwarding
 
4    Using the Secure Shell Commands
4.1    Copying Files
4.1.1    Using the scp2 Command
4.1.2    Using the sftp2 Command
4.2    Logging In and Executing Commands on a Server
 
Examples
3-1    Sample sshd2_config File
3-2    Sample ssh2_config File
3-3    Public Key Authentication Login Output
 
Tables
1-1    Secure Shell Commands
 
Index