SSH Communications Security
Index
SSH Home page
Previous Next Up [Contents] [Index]

    Introduction >>
    Configuration >>
        Saving Settings
        Multiple Settings Files
        Loading Settings
        Profile Settings >>
            Connection
            Cipher List
            Keyboard
            Tunneling
            Outgoing Tunnel and Incoming Tunnel
            Outgoing Tunnel Definition
            Incoming Tunnel Definition
        Global Settings>>
        Customize
    Connecting >>
    Terminal Window >>
    File Transfer >>
    Toolbar Reference >>
    Menu Reference >>
    Advanced Information >>
    Troubleshooting >>
    Appendices >>

Connection

The protocol settings used in the connection are configured using the Connection page of the Settings dialog. Any changed connection settings will take effect the next time you login.


connection-page-2.gif
Figure : The Connection page of the Settings dialog.

  • Host Name

    Type the name of the remote host computer whose connection settings you want to edit.

  • User Name

    Type the user name you want to use when connecting to the remote host computer.

  • Port Number

    Type the port number you want to use for the SSH2 connection. The default port is 22.

  • Authentication Methods

    With the Authentication Methods list you can define a custom authentication method for a host. With the icons displayed above the list you can add a new authentication method, delete an existing authentication method and move the authentication methods upwards or downwards in the preference list. Authentication methods higher up in the list will be attempted first.

  • Encryption Algorithm

    Select the desired encryption algorithm from the drop down menu. Valid choices are 3DES, Blowfish, Twofish, Arcfour, and CAST128. You can also select to use whatever default that is used by the remote host computer, or create your own customized preference list of algorithms. For more information on the custom option, see section Cipher List.

  • MAC Algorithm

    Select the desired MAC algorithm (hash algorithm) from the dropdown menu. Valid choices are HMAC-MD5 and HMAC-SHA1. You can also select whatever default that is used by the remote host computer.

  • Compression

    Select the desired compression setting from the dropdown menu. Valid choices are zlib and none.

  • Terminal Answerback

    Select the desirecd terminal answerback from the dropdown menu. Possible choices are ansi, vt100, vt102, vt220, vt320 and xterm.

  • Connect through Firewall

    Check the checkbox if you are connecting through a firewall. For more information on the firewall settings, see section Firewall.

  • Request Tunnels Only

    Check the Request Tunnels Only checkbox if want to allow only tunnels and disable all terminal connections.

Previous Next Up [Contents] [Index]


[ Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2000 SSH Communications Security Corp
All rights reserved.