Title and Copyright Information
About This Manual
Reader's Comments
1    Secure Shell Overview
1.1    The Secure Shell Server
1.2    The Secure Shell Client
1.3    Server and Client Communication
2    Installing the Secure Shell Software
2.1    Downloading the Secure Shell Software
2.2    Installing the Secure Shell Software
2.3    Installing and Viewing the Secure Shell Documentation
2.4    Starting the Server Software
2.5    Uninstalling the Secure Shell Software
2.6    Removing the Secure Shell Documentation
2.7    Secure Shell Directories and Files
3    Configuring and Managing the Secure Shell Software
3.1    Configuring the Server
3.2    Configuring the Client
3.2.1    Configuring r* Commands to Use Secure Shell
3.3    User Authentication Methods
3.3.1    Password Authentication Method
3.3.2    Public Key Authentication Method    Configuring Public Key Authentication on the Client    Configuring Public Key Authentication on the Server    Logging In to the Server Using Public Key Authentication    Managing Passphrases
3.3.3    Host-Based Authentication Method    Configuring Host-Based Authentication    Connecting Using Host-Based Authentication
3.4    Managing the Server
3.4.1    Starting, Stopping, and Resetting the sshd2 Daemon
3.4.2    Generating A Host Key
3.4.3    Forwarding TCP/IP and X11 Data Through a Secure Shell Connection    TCP/IP Port Forwarding    X11 Forwarding
4    Using the Secure Shell Commands
4.1    Copying Files
4.1.1    Using the scp2 Command
4.1.2    Using the sftp2 Command
4.2    Logging In and Executing Commands on a Server
3-1    Sample sshd2_config File
3-2    Sample ssh2_config File
3-3    Public Key Authentication Login Output
1-1    Secure Shell Commands
3-1    sshd2_config Sections
3-2    ssh2_config Sections