Table Of Contents - HP NonStop SSH 544701-014 Reference Manual

Table of Contents

Advertisement

Contents
HP NonStop SSH Reference Manual
Who Should Read This Guide ................................................................................................. 13
Related Reading ....................................................................................................................... 13
Document History .................................................................................................................... 15
The SSH2 Solution .................................................................................................................. 25
Fully Compliant with the SSH Protocol Specification .............................................. 25
Strong Authentication and Multiple Cipher Suites .................................................... 25
Support of Full Screen Terminal Access ................................................................... 25
Built-in User Base ..................................................................................................... 25
Central Key Store ...................................................................................................... 26
Secure SFTP Transfer ................................................................................................ 26
TCP and FTP Port Forwarding .................................................................................. 26
Single Sign-on ........................................................................................................... 26
TCP/IPv6 ................................................................................................................... 26
The SSH Protocol .................................................................................................................... 26
Components of the SSH2 Software Package ........................................................................... 27
Architecture Overview ............................................................................................................. 28
SSH2 Running as SSH Daemon (Server) .................................................................. 28
SSH2 Running as SSH Client .................................................................................... 29
System Requirements .............................................................................................................. 31
Acquiring the Product Archives .............................................................................................. 31
Installation on the NonStop Server .......................................................................................... 32
Installing the SSH Components on the NonStop System .......................................... 32
Unlocking the Product with a License File ................................................................ 33
SSH2 License and Version Information .................................................................................. 34
Updating to a new version of the SSH2 file set ....................................................................... 34
Download of the object file set .................................................................................. 34
Installation of the new version ................................................................................... 34
Where configuration data is stored ............................................................................ 35
Migration Considerations ........................................................................................................ 35
Installation of SFTPAPI........................................................................................................... 35
Quick Start and Guided Tour ................................................................................................... 35
Quick-Starting the SSH2 System .............................................................................. 36
Secure Shell Access to the NonStop Server .............................................................. 38
Secure Shell Access from NonStop to Remote Systems ........................................... 39
Encrypted File Transfer ............................................................................................. 41
Using Public Keys to Authenticate Remote Users .................................................... 43
Using Public Keys to Logon to Remote Systems ...................................................... 44
13
25
31
47
Contents • iii

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents