Managing Secure Shell Access in Oracle® Solaris 11.2

Exit Print View

Updated: September 2014

Configuring Secure Shell (Task Map)

The following task map points to procedures for configuring Secure Shell. To use Secure Shell, see Using Secure Shell (Tasks).

For Instructions
Configure host-based authentication.
Configures host-based authentication on the client and server.
Increase buffer size to handle connection latency.
Raises the value of the TCP property recv_buf for high bandwidth, high latency networks.
Configure port forwarding.
Enables users to use port forwarding.
Configure exceptions to Secure Shell system defaults.
For users, hosts, groups, and addresses, specifies Secure Shell values that are different from the system defaults.
Isolate a root environment for sftp transfers.
Provides a protected directory for file transfers.