- Host Name
Type the name of the remote host computer you want to connect to using
this profile. If you specify
* (an asterisk) as the host name,
you will be prompted to type in the host name when connecting.
- User Name
Type the user name you want to use when connecting to the remote host
computer. If you specify
* (an asterisk) as the user name, you
will be prompted to type in the user name when connecting. If you
%USERNAME% (note the percent signs) as
the user name, it will be replaced with the name of the current Windows
user account upon connecting.
- Port Number
Type the port number you want to use for the Secure Shell connection. The
default port is 22.
sshd2 daemon program must be listening to the
specified port on the remote host computer or the connection attempt will not
succeed. If you are unsure which port the remote host computer is listening
to, contact the system administrator of the remote host.
- Encryption Algorithm
Select the desired encryption algorithm from the drop-down menu. Valid
CAST. Also DES is supported
for compatibility reasons, however it is no longer considered
cryptographically secure. You can also select whatever
that is used by the remote host computer, use no enryption
none) at all, or create your own
cipher list. For
more information on the
Cipher List option, see Section Selecting Ciphers.
For the AES and Twofish algorithms you can also choose the strength of
encryption, meaning how many bits will be used. Greater values are more
secure, but slower to use. Possible values are 128, 192, or 256 bits.
Note: If you select
none as the encryption algorithm,
the communications for this profile will not be encrypted and all
information will be sent as plaintext. The
method is not secure and its use is not recommended. Use it only for
testing purposes! If you select this option, a warning dialog will be
- MAC Algorithm
Select the desired Message Authentication Code (MAC) algorithm (hash
algorithm) from the drop-down menu. Valid choices are
HMAC-SHA1. You can also select which
used by the remote host computer, or select to use no message
authentication code at all (
none). If you select not to use any
MAC algorithm, a confirmation dialog will be displayed. The default MAC
Select the desired compression setting from the drop-down menu. Valid
none. Compression is disabled by
- Terminal Answerback
Select the desired terminal answerback from the drop-down menu. Possible
- Connect through Proxy
Select the check box if you are connecting through a proxy.
For more information on the proxy settings, see Section
Defining Proxy Settings.
- Request Tunnels Only (Disable Terminal)
Select the Request Tunnels Only check box if you wish to only
set up the specified tunnels and not request a terminal or file transfer