Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
        Defining Profile Settings >>
            Defining Connection Settings
            Selecting Ciphers
            Selecting Authentication Methods
            Selecting Colors
            Defining Keyboard Settings
            Using Keymap Editor
            Tunneling Applications
            Defining File Transfer Settings
            Defining Favorites
        Defining Global Settings >>
        Editing the Configuration Files >>
        Using Command-Line Options
        Customizing the User Interface>>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Defining Keyboard Settings

The keyboard settings used for the connection are configured using the Keyboard page of the Settings dialog. Keyboard mappings take effect when you start a new connection or reset the terminal.

Figure : The Keyboard page of the Settings dialog

  • User Defined Keymap File

    With this option you can create additional keyboard shortcuts or modify the existing ones. The additional key mappings are saved into a separate file with the .sshmap file extension. The current keymap file is displayed in the text field.

    You can modify the current key mappings by clicking Edit to open the Keymap Editor dialog. For more information on using the Keymap Editor, see Section Using Keymap Editor.

    If you have defined an alternative keymap settings file, you can load it by typing the path and file name in the text field, or by clicking on the button on the right-hand side of the text field. Clicking the button will open an Open dialog that allows you to locate an alternative keymap file.

  • Backspace sends Delete

    Select the Backspace sends Delete check box if you want to map the Backspace key to the Delete operation.

  • Delete Sends Backspace

    Select the Delete Sends Backspace check box if you want to map the Delete key to the Backspace operation.

  • Enter sends CR + LF

    Select the Enter sends CR + LF check box if you want to map the Enter key to send the carriage return (CR) and line feed (LF) characters. Otherwise only the line feed character will be sent.

  • Lock Function Keys

    Select the Lock Function Keys check box if you want to lock the function keys.

  • Line Wrap

    Select the Line Wrap check box if you want the text lines to wrap at the terminal window edge. By default, line wrapping is on.

  • Use Alt as meta key (send Escape)

    Select the Use Alt as meta key (send Escape) check box if you want the Alt key to function as the meta key in the same way as the Escape key. If this option is selected, you can for example press the Alt+X key combination to simulate the Escape followed by X.

  • Keypad Mode

    Select how you want the numeric keypad on the right-hand side of the regular keyboard to function.

    Numeric Keypad: The keypad is used to type numbers.

    Application Keypad: The keypad is used for application control (with the keypad keys functioning as cursor keys, Home, End, Page Up, Page Down, Insert and Delete).

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more