Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

SSH Tectia Shortcut Menu (Windows)

When SSH Tectia Client (or Connection Broker) is running on Windows, and if so selected in the General settings in the SSH Tectia Configuration GUI, the SSH Tectia icon is displayed on the system tray, typically next to the time display at the bottom of the Windows desktop.

Double-click the SSH Tectia icon to open the Status dialog box, or right-click it to open a shortcut menu.

The contents of the shotcut menu depend on what is defined in the SSH Tectia Configuration GUI in the General view (see Defining General Settings).

The shortcut menu of the Status dialog box

Figure 3.4. The shortcut menu of the Status dialog box

In the menu, you have the following options:

  • Transparent tunneling enabled is shown in the menu if the transparent TCP tunneling feature has been installed and configured active on the machine when the Connection Broker starts.

    You can disable transparent TCP tunneling temporarily by unselecting the option in the shorcut menu. This setting does not affect the Connection Broker configuration, only the current Connection Broker session.

  • Configuration opens the SSH Tectia Configuration GUI.

  • Status opens the SSH Tectia Status window where you can view information on the Connection Broker. For details, see SSH Tectia Status Dialog Box (Windows).

  • About shows the installed SSH Tectia Client version.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more