skip book previous and next navigation links
go up to top of book: HP TCP/IP Services for OpenVMS Guide to SSH HP TCP/IP Services for OpenVMS Guide to SSH
go to beginning of chapter: Configuring the Secure Shell Software Configuring the Secure Shell Software
 
go to next page: Configuring the SSH ClientConfiguring the SSH Client
end of book navigation links

Running the TCPIP$CONFIG Configuration Command Procedure  



After TCP/IP installation is complete, the SSH service must be configured using the TCP/IP configuration command procedure, TCPIP$CONFIG.COM. The configuration creates the systemwide SSH environment by setting up various components of SSH, such as configuration files and host keys.

Once you have completed the client and server configuration using TCPIP$CONFIG, you can customize the configuration with parameters to meet the needs of your specific run-time environment. For more information about customizing your run-time environment, see Chapter 3.

To run the configuration command procedure, follow these steps:

  1. Invoke the TCPIP$CONFIG configuration command procedure. For general configuration procedures, refer to the HP TCP/IP Services for OpenVMS Installation and Configuration manual. The main Configuration menu is displayed:
    HP TCP/IP Services for OpenVMS Configuration Menu		Configuration options:		
    				1  -  Core environment
    2  -  Client components
    3  -  Server components
    4  -  Optional components5  -  Shutdown HP TCP/IP Services for OpenVMS
    				6  -  Startup HP TCP/IP Services for OpenVMS
    7  -  Run testsA  -  Configure options 1 - 4[E] -  Exit configuration procedureEnter configuration option:
  2. Choose option 3 (Server components) to configure the SSH server and option 2 (client components) to configure the SSH client. For details, see the sections Configuring the SSH Client and Configuring the SSH Server.

During the configuration procedure, TCPIP$CONFIG creates the systemwide environment necessary to run the SSH client and server. TCPIP$CONFIG does the following:

Table 1  Files and Directories Created During SSH Configuration
Directory on TCPIP$SSH_DEVICE: File Name Description Server/ Client
[TCPIP$SSH.SSH2]
SSH2_CONFIG.
Configuration file
Client
[TCPIP$SSH.SSH2]
SSHD2_CONFIG.
Configuration file
Server (Client for host-based authen- tication)
[TCPIP$SSH]
SHOSTS.EQUIV
This file contains a list of trusted hosts, used by the host-based authentication method.
Server
[TCPIP$SSH.SSH2]
HOSTKEY. HOSTKEY.PUB
Private (HOSTKEY) and public (HOSTKEY.PUB) server host keys.
Server
[TCPIP$SSH.SSH2.SEED]
RANDOM_SEED.
Generates pseudo random numbers for cryptographics operations.
Server
[TCPIP$SSH.SSH2.KNOWNHOSTS]

Contains public keys of all remote client hosts that may attempt to connect to the server using host-based authentication.
Server
[TCPIP$SSH.SSH2.HOSTKEYS]

Contains host keys for all remote servers to which the user connects using the SSH client.
Client


 
go to next page: Configuring the SSH ClientConfiguring the SSH Client