Your browser does not allow storing cookies. We recommend enabling them.


Defining Connection Profile Settings

Under the Connection Profile page, on the Connection tab, you can define the protocol settings used in the connection. Any changed connection settings will take effect the next time you log in.

Configuring connection profiles

Figure 3.6. Configuring connection profiles


In Profile name, type a name for the profile.


In Host name, enter the name of the remote host computer to which you want to connect with the profile.

In Port number, enter the port number you want to use for the Secure Shell connection. The default port is 22.


A Secure Shell server program must be listening to the specified port on the remote host computer or the connection attempt will not succeed. If you are unsure which port the remote host computer is listening to, contact the system administrator of the remote host.

User Name

Select Use current user name if the connection should always be made using the currently logged in Windows or Unix user name. This is similar to defining %USERNAME% (note the percent signs) as the user name.

Select Specify user name and enter the user name, if you want to define the user name to be used when connecting to the remote host computer. If you specify %USERNAME% (note the percent signs) as the user name, it will be replaced with the name of the current Windows or Unix user account upon connecting.


Not needed now: In Compression, select the desired compression setting from the drop-down menu. Valid choices are zlib and none. Compression is disabled by default.

Not needed now: In Tunnel using profile, select the desired connection profile from the drop-down menu. Any nested tunnels will be created through the profile. For information on the tunneling features, refer to Chapter 6.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now