Task |
Description |
For Instructions |
---|---|---|
Create a public/private key pair |
The use of public/private key pairs is the preferred method for authenticating yourself and encrypting your communications. | |
Log in with Solaris Secure Shell | Encrypted Secure Shell communication is enabled by logging in remotely through a process similar to using rsh. | |
Log in without a password with Solaris Secure Shell |
You can log in using Secure Shell without having to provide a password by using ssh-agent. The ssh-agent command can be run manually or from a startup script. | |
Port forwarding in Solaris Secure Shell |
You can specify a local port or a remote port to be used in a Secure Shell connection over TCP. | |
Copy files with Solaris Secure Shell |
You can copy remote files securely. | |
Transfer files with Solaris Secure Shell |
You can log in to a remote host with Secure Shell by using transfer commands that are similar to ftp. | |
Connect from a host inside a firewall to a host on the outside |
Secure shell provides commands that are compatible with HTTP or SOCKS5. The commands can be specified in a configuration file or on the command line. |
How to Set Up Default Connections to Hosts Outside a Firewall Example—Connecting to Hosts Outside a Firewall From the Command Line |