SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
![]() | ![]() | |
![]() | ||
![]() |
With SSH Tectia Connector, there is no need to separately configure application software to use local ports to set up the tunnels. The applications to be tunneled are defined in the Connection Broker configuration (SSH Tectia Connector → Filters). SSH Tectia Connector automatically captures the defined applications and the Connection Broker creates Secure Shell tunnels to the defined SSH Tectia Server. See Defining Filter Rules.