User's Manual

Solaris 9 Security CX-310-301 9
Undoing SST .......................................................................................................................... 69
Verifying SST.......................................................................................................................... 70
Network Connection Access, Authentication and Encryption .................................71
TCP Wrappers ........................................................................................................................... 71
Configuring TCP Wrappers .................................................................................................... 71
Denying and Allowing Host Connects .................................................................................... 72
Denying Connections with a Banner Message ...................................................................... 72
Logging................................................................................................................................... 73
Validating TCP Wrappers....................................................................................................... 73
Cryptology .................................................................................................................................. 74
Terminology............................................................................................................................ 74
Solaris Secure Shell................................................................................................................... 74
Configuring the Server ........................................................................................................... 75
Starting and Stopping SSHD.................................................................................................. 75
Configuring the Client............................................................................................................. 75
Generating a Client Key .........................................................................................................76
Using ssh................................................................................................................................ 76