SSH Reference Manual
SOCKETRCVBUF ................................................................................................................ 116 
SOCKETSNDBUF ................................................................................................................ 116 
SOCKTCPMINRXMT .......................................................................................................... 117 
SOCKTCPMAXRXMT ........................................................................................................ 117 
SOCKTCPRXMTCNT .......................................................................................................... 118 
SOCKTCPTOTRXMTVAL .................................................................................................. 118 
SSHAUTOKEXBYTES ........................................................................................................ 119 
SSHAUTOKEXTIME ........................................................................................................... 119 
SSHCTL ................................................................................................................................ 119 
SSHCTLAUDIT .................................................................................................................... 120 
SSHKEEPALIVETIME ........................................................................................................ 121 
STOREDPASSWORDSONLY ............................................................................................. 121 
STRICTHOSTKEYCHECKING .......................................................................................... 122 
SUBNET ................................................................................................................................ 122 
SUPPRESSCOMMENTINSSHVERSION ........................................................................... 123 
TCPIPHOSTFILE .................................................................................................................. 123 
TCPIPNODEFILE ................................................................................................................. 124 
TCPIPRESOLVERNAME .................................................................................................... 125 
USETEMPLATESYSTEMUSER ......................................................................................... 125 
Enabling Full TTY Access ................................................................................................................... 126 
Enabling 6530 Terminal Access .......................................................................................................... 126 
Configuring an Alternate Command Interpreter .................................................................... 127 
Configuring a Service Menu .................................................................................................. 127 
Configuring an STN Service or Window ............................................................................... 127 
Forcing TACL Access via Server-side Configuration ........................................................... 128 
Using TELSERV as Service Provider ................................................................................... 129 
Granting Access without SSH Authentication ..................................................................................... 129 
Single Sign-on with GSSAPI Authentication ...................................................................................... 130 
Overview ............................................................................................................................... 130 
Prerequisites ........................................................................................................................... 130 
Configuration of the GSSAPI Interface Process .................................................................... 130 
Enabling GSSAPI Authentication for a User Account .......................................................... 131 
Authorizing Kerberos Principals for Logon ........................................................................... 131 
Restricting Incoming and Outgoing Connections ................................................................................ 132 
Rejecting Gateway Ports ........................................................................................................ 132 
Restricting External Access to SSH2 Process ........................................................................ 132 
Restricting Internal Access to Remote SSH2 Hosts .............................................................. 132 
Restricting Local Ports used for Port Forwarding.................................................................. 133 
Restricting Remote Hosts/Ports for Port Forwarding ............................................................ 133 
Restricting access to forwarding tunnels ............................................................................... 133 
Load Balancing .................................................................................................................................... 134 
Load-Balancing Outbound SSH Sessions .............................................................................. 134 
Load-Balancing Inbound SSH Sessions ................................................................................ 134 
Fault Tolerance .................................................................................................................................... 135 
Configuring SSH2 as a NonStop Process Pair ....................................................................... 135 
Configuring SSH2 as a Generic Process ................................................................................ 135 
Choosing a Persistence Mechanism ....................................................................................... 136 
Processing of DEFINEs ....................................................................................................................... 136 
Setting of PARAMs ............................................................................................................................. 137 
Setting of Environment Variables ........................................................................................................ 137 
TCP/IPv6 Configuration ...................................................................................................................... 139 
IPv6 Address Formats ............................................................................................................ 139 
Usage of IPv6 Addresses ....................................................................................................... 139 
IP Mode ................................................................................................................................. 140 
TCP/IPv6 Considerations ..................................................................................................................... 140 
Using Link Local Addresses for Loopback ........................................................................... 140 
vi • Contents  HP NonStop SSH Reference Manual 










