Chapter 3 Customizing the SSH Run-Time Environment
Table of Contents When the TCP/IP configuration procedure has completed successfully, all of the required systemwide SSH configuration parameters are established. The host is now prepared to become an SSH server by accepting remote connections, and the SSH client is ready to execute SSH commands. Additional security methods can be applied at the following levels:
This chapter describes how to customize the SSH run-time environment to meet your specific security requirements, and discusses the following topics:
|