SSH Reference Manual
Contents 
Preface  13 
Who Should Read This Guide ................................................................................................................ 13 
Related Reading ..................................................................................................................................... 13 
Document History .................................................................................................................................. 15 
Introduction  25 
The SSH2 Solution ................................................................................................................................ 25 
Fully Compliant with the SSH Protocol Specification ............................................................ 25 
Strong Authentication and Multiple Cipher Suites .................................................................. 25 
Support of Full Screen Terminal Access ................................................................................. 25 
Built-in User Base .................................................................................................................... 25 
Central Key Store .................................................................................................................... 26 
Secure SFTP Transfer .............................................................................................................. 26 
TCP and FTP Port Forwarding ................................................................................................ 26 
Single Sign-on ......................................................................................................................... 26 
TCP/IPv6 ................................................................................................................................. 26 
The SSH Protocol .................................................................................................................................. 26 
Components of the SSH2 Software Package ......................................................................................... 27 
Architecture Overview ........................................................................................................................... 28 
SSH2 Running as SSH Daemon (Server) ................................................................................ 28 
SSH2 Running as SSH Client .................................................................................................. 29 
Installation & Quick Start  31 
System Requirements ............................................................................................................................. 31 
Acquiring the Product Archives ............................................................................................................. 31 
Installation on the NonStop™ Server .................................................................................................... 32 
Installing the SSH Components on the NonStop™ System .................................................... 32 
Unlocking the Product with a License File .............................................................................. 33 
SSH2 License and Version Information ................................................................................................. 34 
Updating to a new version of the SSH2 file set ..................................................................................... 34 
Download of the object file set ................................................................................................ 34 
Installation of the new version ................................................................................................. 34 
Where configuration data is stored .......................................................................................... 35 
Migration Considerations ....................................................................................................................... 35 
Installation of SFTPAPI ......................................................................................................................... 35 
Quick Start and Guided Tour ................................................................................................................. 35 
Quick-Starting the SSH2 System ............................................................................................. 36 
Secure Shell Access to the NonStop™ Server ......................................................................... 39 
Secure Shell Access from NonStop™ to Remote Systems ...................................................... 40 
Encrypted File Transfer ........................................................................................................... 42 
Using Public Keys to Authenticate Remote Users ................................................................... 44 
Using Public Keys to Logon to Remote Systems .................................................................... 45 
Configuring and Running SSH2  47 
HP NonStop SSH Reference Manual  Contents • iii 










