SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    File Transfer Using SFTP >>
    File Transfer Using Transparent FTP Tunneling >>
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages
        scp2
        sftp2
        ssh-add2
        ssh-agent2
        ssh-socks-proxy >>
        ssh-socks-proxy-config >>
        ssh-socks-proxy-ctl >>
        ssh-certd
        ssh_certd_config
        ssh-certview >>
        ssh-cmpclient >>
        ssh-dummy-shell
        ssh-ekview
        ssh-externalkeys
        ssh-keydist2 >>
        ssh-keygen2
        ssh-probe2
        ssh-scepclient >>
        ssh-sft-stage
        ssh2
        ssh2_config
        sshd-check-conf
        sshd2
        sshd2_config
        sshd2_subconfig
        sshregex
    Log Messages >>

Man Pages

The following manual pages are are installed to /usr/lpp/ssh2/man:

  • scp2(1): secure copy client on z/OS
  • sftp2(1): secure FTP client on z/OS
  • ssh-add2(1): adds identities for the authentication agent
  • ssh-agent2(1): authentication agent
  • ssh-certd(8): Secure Shell Certificate Validator on z/OS
  • ssh_certd_config(5): configuration file format for ssh-certd on z/OS
  • ssh-certview(1): certificate viewer
  • ssh-cmpclient(1): CMP certificate enrollment client on z/OS
  • ssh-dummy-shell(1): ultimately restricted shell
  • ssh-ekview(1): external key viewer on z/OS
  • ssh-externalkeys(5): instructions on using external keys with SSH Tectia Server for IBM z/OS
  • ssh-keygen2(1): authentication key pair generation
  • ssh-probe2(1): seeks Secure Shell servers from the local network
  • ssh-sft-stage(1): stage and destage MVS datasets and HFS files
  • ssh2(1): Secure Shell client (remote login program) on z/OS
  • ssh2_config(1): ssh2 configuration file format on z/OS
  • sshd-check-conf(5): check what your configuration allows or denies based on incoming username and/or hostname
  • sshd2(8): Secure Shell server daemon on z/OS
  • sshd2_config(5): sshd2 configuration file format on z/OS
  • sshd2_subconfig(5): advanced configuration of sshd2 on z/OS
  • sshregex(1): describes the regular expressions (or globbing patterns) used in filename globbing with scp2 and sftp2 and in the configuration files ssh2_config and sshd2_config

For convenience, the contents of the manual pages are also shown in the following sections.

scp2

sftp2

ssh-add2

ssh-agent2

ssh-socks-proxy

ssh-socks-proxy-config

ssh-socks-proxy-ctl

ssh-certd

ssh_certd_config

ssh-certview

ssh-cmpclient

ssh-dummy-shell

ssh-ekview

ssh-externalkeys

ssh-keydist2

ssh-keygen2

ssh-probe2

ssh-scepclient

ssh-sft-stage

ssh2

ssh2_config

sshd-check-conf

sshd2

sshd2_config

sshd2_subconfig

sshregex

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice