SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server >>
    Getting Started >>
        Location of Installed Files >>
        Starting and Stopping the Server >>
        Operation of the Server >>
        SSH Tectia Server (T) >>
        SSH Tectia Server (A)
            Privileged Users
            Restricting Connections
            Logging
            Verifying Configuration
        SSH Tectia Client >>
        Examples of Use
    Configuration >>
    Authentication >>
    Application Tunneling >>
    Troubleshooting >>
    Man Pages
    Advanced Options >>
    Log Messages >>

SSH Tectia Server (A)

The configuration of SSH Tectia Server (A) typically sets limitations on secure remote administration. SSH Tectia Server (A) often resides in the DMZ. Strong two-factor authentication is often required from privileged users and connections are allowed only from certain hosts.

Privileged Users

Restricting Connections

Logging

Verifying Configuration

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice