Configuring Secure Shell Task Map
The following task map points to administrative procedures for
configuring Secure Shell. Procedures that regular users can perform are in
Using Secure Shell.
|
|
|
Run OpenSSH.
|
Switches from the default SunSSH to the latest OpenSSH
implementation of Secure Shell.
|
|
Run Secure Shell in FIPS 140-2 mode.
|
Enables your Secure Shell implementation to use FIPS 140-2 ciphers from OpenSSL.
|
|
Configure X.509 certificates for the SunSSH client and
server.
|
Enables SunSSH to use certificate-based
authentication.
|
|
Configure host-based authentication.
|
Configures host-based authentication on the client and server.
|
|
Increase buffer size to handle connection latency.
|
Raises the value of the TCP property
recv_buf for high bandwidth, high latency
networks.
|
|
Configure port forwarding.
|
Enables users to use port forwarding.
|
|
Configure exceptions to Secure Shell defaults.
|
For users, hosts, groups, and addresses,
specifies Secure Shell values that are different from the defaults.
|
|
Isolate a root environment for
sftp transfers.
|
Provides a protected directory for file transfers.
|
|
|