User's Manual
 Solaris 9 Security CX-310-301    9   
Undoing SST .......................................................................................................................... 69
Verifying SST.......................................................................................................................... 70 
Network Connection Access, Authentication and Encryption .................................71 
TCP Wrappers ........................................................................................................................... 71 
Configuring TCP Wrappers .................................................................................................... 71 
Denying and Allowing Host Connects .................................................................................... 72 
Denying Connections with a Banner Message ...................................................................... 72 
Logging................................................................................................................................... 73 
Validating TCP Wrappers....................................................................................................... 73 
Cryptology .................................................................................................................................. 74 
Terminology............................................................................................................................ 74 
Solaris Secure Shell................................................................................................................... 74 
Configuring the Server ........................................................................................................... 75 
Starting and Stopping SSHD.................................................................................................. 75 
Configuring the Client............................................................................................................. 75 
Generating a Client Key .........................................................................................................76 
Using ssh................................................................................................................................ 76 










