Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
        Defining Profile Settings >>
            Defining Connection Settings
            Selecting Ciphers
            Selecting Authentication Methods
            Selecting Colors
            Defining Keyboard Settings
            Using Keymap Editor
            Tunneling Applications
            Defining File Transfer Settings
            Defining Favorites
        Defining Global Settings >>
        Editing the Configuration Files >>
        Using Command-Line Options
        Customizing the User Interface>>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Defining Keyboard Settings

The keyboard settings used for the connection are configured using the Keyboard page of the Settings dialog. Keyboard mappings take effect when you start a new connection or reset the terminal.

Figure : The Keyboard page of the Settings dialog

  • User Defined Keymap File

    With this option you can create additional keyboard shortcuts or modify the existing ones. The additional key mappings are saved into a separate file with the .sshmap file extension. The current keymap file is displayed in the text field.

    You can modify the current key mappings by clicking Edit to open the Keymap Editor dialog. For more information on using the Keymap Editor, see Section Using Keymap Editor.

    If you have defined an alternative keymap settings file, you can load it by typing the path and file name in the text field, or by clicking on the button on the right-hand side of the text field. Clicking the button will open an Open dialog that allows you to locate an alternative keymap file.

  • Backspace sends Delete

    Select the Backspace sends Delete check box if you want to map the Backspace key to the Delete operation.

  • Delete Sends Backspace

    Select the Delete Sends Backspace check box if you want to map the Delete key to the Backspace operation.

  • Enter sends CR + LF

    Select the Enter sends CR + LF check box if you want to map the Enter key to send the carriage return (CR) and line feed (LF) characters. Otherwise only the line feed character will be sent.

  • Lock Function Keys

    Select the Lock Function Keys check box if you want to lock the function keys.

  • Line Wrap

    Select the Line Wrap check box if you want the text lines to wrap at the terminal window edge. By default, line wrapping is on.

  • Use Alt as meta key (send Escape)

    Select the Use Alt as meta key (send Escape) check box if you want the Alt key to function as the meta key in the same way as the Escape key. If this option is selected, you can for example press the Alt+X key combination to simulate the Escape followed by X.

  • Keypad Mode

    Select how you want the numeric keypad on the right-hand side of the regular keyboard to function.

    Numeric Keypad: The keypad is used to type numbers.

    Application Keypad: The keypad is used for application control (with the keypad keys functioning as cursor keys, Home, End, Page Up, Page Down, Insert and Delete).

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now