Show Contents / Index / Search

Replace an Existing Secure Shell Program

If you're installing on a system that is already running a Secure Shell client or server, you must uninstall the prior version before you install Reflection for Secure IT. This requirement applies to earlier versions of Reflection for Secure IT, as well as F-Secure SSH, OpenSSH, and other Secure Shell implementations.

To install on a system that is currently running Secure Shell

  1. Log in as root.
  2. (Server only) Stop the sshd service.
  3. Uninstall your existing Secure Shell product.
  4. (AIX only) Check for the existence of a hidden .toc file in the directory from which you ran installp to uninstall your previous version. If this file is present, remove or rename it.
  5. Install the Reflection for Secure IT client or server.
  6. (Optional) If you had configured a non-default client or server configuration file, you will find a backup copy of your file in the configuration file directory. Use these backup files to merge your non-default settings to the new configuration file.

Notes:

  • The server installation package checks to see if an existing host key pair is already present. If no host key is found, the package creates a new host key pair and the server uses this pair for host authentication. If a host key already exists in /etc/ssh2, Reflection for Secure IT uses this key. If an OpenSSH host key is found in /etc/ssh, Reflection for Secure IT migrates the key to the correct format and location and uses the migrated key.
  • The details of how backup configuration files are created varies with the associated operating system.
    • On all platforms except AIX, if you have made any changes to the default client and/or server configuration file, the installer backs up the file when you uninstall. (The file extension added to this backup depends on the native installer.)
    • On AIX, no backup file is created when you uninstall; instead, a backup file is created if a non-default configuration file is present when you install Reflection for Secure IT.

Related Topics

Install on Linux

Install on Sun Solaris

Install on HP-UX

Install on IBM AIX