SSH Reference Manual

Contents
Preface 13
Who Should Read This Guide ................................................................................................................ 13
Related Reading ..................................................................................................................................... 13
Document History .................................................................................................................................. 15
Introduction 25
The SSH2 Solution ................................................................................................................................ 25
Fully Compliant with the SSH Protocol Specification ............................................................ 25
Strong Authentication and Multiple Cipher Suites .................................................................. 25
Support of Full Screen Terminal Access ................................................................................. 25
Built-in User Base .................................................................................................................... 25
Central Key Store .................................................................................................................... 26
Secure SFTP Transfer .............................................................................................................. 26
TCP and FTP Port Forwarding ................................................................................................ 26
Single Sign-on ......................................................................................................................... 26
TCP/IPv6 ................................................................................................................................. 26
The SSH Protocol .................................................................................................................................. 26
Components of the SSH2 Software Package ......................................................................................... 27
Architecture Overview ........................................................................................................................... 28
SSH2 Running as SSH Daemon (Server) ................................................................................ 28
SSH2 Running as SSH Client .................................................................................................. 29
Installation & Quick Start 31
System Requirements ............................................................................................................................. 31
Acquiring the Product Archives ............................................................................................................. 31
Installation on the NonStop™ Server .................................................................................................... 32
Installing the SSH Components on the NonStop™ System .................................................... 32
Unlocking the Product with a License File .............................................................................. 33
SSH2 License and Version Information ................................................................................................. 34
Updating to a new version of the SSH2 file set ..................................................................................... 34
Download of the object file set ................................................................................................ 34
Installation of the new version ................................................................................................. 34
Where configuration data is stored .......................................................................................... 35
Migration Considerations ....................................................................................................................... 35
Installation of SFTPAPI ......................................................................................................................... 35
Quick Start and Guided Tour ................................................................................................................. 35
Quick-Starting the SSH2 System ............................................................................................. 36
Secure Shell Access to the NonStop™ Server ......................................................................... 39
Secure Shell Access from NonStop™ to Remote Systems ...................................................... 40
Encrypted File Transfer ........................................................................................................... 42
Using Public Keys to Authenticate Remote Users ................................................................... 44
Using Public Keys to Logon to Remote Systems .................................................................... 45
Configuring and Running SSH2 47
HP NonStop SSH Reference Manual Contents iii