This guide describes how to configure, customize, manage, and use the
Secure Shell software. It contains the following chapters and appendixes:
Chapter 1 introduces definitions
and concepts that are important to understanding the Secure Shell (SSH).
Chapter 2 describes
how to run the configuration procedure for SSH, how to configure the SSH
server, and how to configure the SSH client.
Chapter 3 describes how
to customize the SSH run-time environment to meet your organization's specific
Chapter 4 describes how
to manage the SSH client and server.
Chapter 5 describes port forwarding
Chapter 6 describes how to
set up Kerberos security with SSH connections.
Chapter 7 describes SSH
commands and utilities that you can use to invoke SSH, copy files, and manage
Chapter 8 describes how
to solve login problems.
Appendix A summarizes
information about files and directories that the SSH client and server use.
Appendix B shows the systemwide
SSH client and server files that the TCPIP$CONFIG utility generates during
Glossary describes some of
the terms that are used in this manual.