SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Using SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Examples of Use
        Secure File Transfers Using the z/OS Client>>
        Secure File Transfers Using Windows and Unix Clients>>
        Submitting JCL Jobs over Secure Shell
        Debugging SSH Tectia Server for IBM z/OS>>
        Example of Distributing Keys >>
    Man Pages >>
    Log Messages >>

Examples of Use

This Appendix gives examples of file transfer, debugging, and key distribution with SSH Tectia Server for IBM z/OS.

Note: In the example commands in this chapter, the backslash character (\) at the end of a line denotes that the command should be entered on a single line (without the backslash character).

Secure File Transfers Using the z/OS Client

Secure File Transfers Using Windows and Unix Clients

Submitting JCL Jobs over Secure Shell

Debugging SSH Tectia Server for IBM z/OS

Example of Distributing Keys

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice