Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
        Connecting to a Remote Host>>
        Defining Profiles >>
            Adding Profiles
            Editing Profiles
            Globally Accessible Profiles
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Adding Profiles

Adding a new profile is easy. When you have connected to a new host computer, select the Profiles -> Add Profile option. The Add Profile dialog opens.


client-addprofile-59.gif
Figure : Type in a name for the new profile

Type a name for the profile (the name of the host computer) and press Enter. You are ready!

When you later want to connect to the same host, just select its profile under the Profiles option. You will be immediately connected, with all the defined settings - including the number and positions of SSH Tectia Client windows.

Using profiles you can have the right connection settings for each host, without the need to define complicated configuration settings.

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more