Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
        Defining Profile Settings >>
            Defining Connection Settings
            Selecting Ciphers
            Selecting Authentication Methods
            Selecting Colors
            Defining Keyboard Settings
            Using Keymap Editor
            Tunneling Applications
            Defining File Transfer Settings
            Defining Favorites
        Defining Global Settings >>
        Editing the Configuration Files >>
        Using Command-Line Options
        Customizing the User Interface>>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Defining Connection Settings

The protocol settings used in the connection are configured using the Connection page of the Settings dialog. Any changed connection settings will take effect the next time you log in.

Figure : The Connection page of the Settings dialog

  • Host Name

    Type the name of the remote host computer you want to connect to using this profile. If you specify * (an asterisk) as the host name, you will be prompted to type in the host name when connecting.

  • User Name

    Type the user name you want to use when connecting to the remote host computer. If you specify * (an asterisk) as the user name, you will be prompted to type in the user name when connecting. If you specify %USERNAME% (note the percent signs) as the user name, it will be replaced with the name of the current Windows user account upon connecting.

  • Port Number

    Type the port number you want to use for the Secure Shell connection. The default port is 22.

    Note: An sshd2 daemon program must be listening to the specified port on the remote host computer or the connection attempt will not succeed. If you are unsure which port the remote host computer is listening to, contact the system administrator of the remote host.

  • Encryption Algorithm

    Select the desired encryption algorithm from the drop-down menu. Valid choices are 3DES, Blowfish, Twofish, AES, Arcfour, and CAST. Also DES is supported for compatibility reasons, however it is no longer considered cryptographically secure. You can also select whatever default that is used by the remote host computer, use no enryption (none) at all, or create your own cipher list. For more information on the Cipher List option, see Section Selecting Ciphers.

    For the AES and Twofish algorithms you can also choose the strength of encryption, meaning how many bits will be used. Greater values are more secure, but slower to use. Possible values are 128, 192, or 256 bits.

    Note: If you select none as the encryption algorithm, the communications for this profile will not be encrypted and all information will be sent as plaintext. The none encryption method is not secure and its use is not recommended. Use it only for testing purposes! If you select this option, a warning dialog will be displayed.

  • MAC Algorithm

    Select the desired Message Authentication Code (MAC) algorithm (hash algorithm) from the drop-down menu. Valid choices are HMAC-MD5 and HMAC-SHA1. You can also select which default is used by the remote host computer, or select to use no message authentication code at all (none). If you select not to use any MAC algorithm, a confirmation dialog will be displayed. The default MAC value is HMAC-SHA1, HMAC-MD5.

  • Compression

    Select the desired compression setting from the drop-down menu. Valid choices are zlib and none. Compression is disabled by default.

  • Terminal Answerback

    Select the desired terminal answerback from the drop-down menu. Possible choices are ansi, vt100, vt102, vt220, vt320, and xterm.

  • Connect through Proxy

    Select the check box if you are connecting through a proxy. For more information on the proxy settings, see Section Defining Proxy Settings.

  • Request Tunnels Only (Disable Terminal)

    Select the Request Tunnels Only check box if you wish to only set up the specified tunnels and not request a terminal or file transfer session.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now