Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
        Connecting to a Remote Host
        Defining Quick Connect Options
        Generating Keys >>
        Enrolling Certificates >>
        Uploading Your Public Key >>
        Using Public-Key Authentication with SSH Accession Lite >>
        Examples of Use
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Defining Quick Connect Options

To start a new connection with the Quick Connect option, do the following:

  1. Select the Quick Connect option (toolbar or File menu) to establish a completely new Secure Shell connection that can be operated independently of any other clients and connections. You can connect to an entirely new remote host computer and still keep the old connection to a different host open.
  2. The Connect to Remote Host dialog opens, containing the values defined in the default configuration file (default.ssh2). Click Connect.

Use the Settings dialog (see Section Saving Settings) to set the most commonly used options and save them in the default.ssh2 configuration file.

When you need to establish a new connection, click the Quick Connect button to connect to a new host with the default settings. When connected, you can modify the settings to match your exact requirements for this particular host and save the settings as a host profile. See Section Defining Profiles.

There is an even faster alternative. When you log in using the default settings, the Add Profile dialog is briefly and non-intrusively shown if it is enabled in the Appearance settings (see Section Defining the Appearance).

Figure : Type in a name for the new profile

Click the dialog and write in the name for the new profile. When you press the Enter key, the profile is automatically saved. It is accessible from the Profiles menu, and can be modified later.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now