![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/9/64/964003d9-e31d-4e5a-b23f-1dd4e75b83f3/964003d9-e31d-4e5a-b23f-1dd4e75b83f3-bga.png)
Solaris 9 Security CX-310-301 9
Undoing SST .......................................................................................................................... 69
Verifying SST.......................................................................................................................... 70
Network Connection Access, Authentication and Encryption .................................71
TCP Wrappers ........................................................................................................................... 71
Configuring TCP Wrappers .................................................................................................... 71
Denying and Allowing Host Connects.................................................................................... 72
Denying Connections with a Banner Message ...................................................................... 72
Logging................................................................................................................................... 73
Validating TCP Wrappers....................................................................................................... 73
Cryptology.................................................................................................................................. 74
Terminology............................................................................................................................ 74
Solaris Secure Shell................................................................................................................... 74
Configuring the Server ........................................................................................................... 75
Starting and Stopping SSHD.................................................................................................. 75
Configuring the Client............................................................................................................. 75
Generating a Client Key .........................................................................................................76
Using ssh................................................................................................................................ 76