Your browser does not allow storing cookies. We recommend enabling them.


Defining Connection Profile Settings

Under the Connection Profile page, on the Connection tab, you can define the protocol settings used in the connection. Any changed connection settings will take effect the next time you log in.

Configuring connection profiles

Figure 3.6. Configuring connection profiles


In Profile name, type a name for the profile.


In Host name, enter the name of the remote host computer to which you want to connect with the profile.

On Windows, when transparent TCP tunneling is used, '%DESTINATION_HOSTNAME%' is supported as the host name definition. This option exists for backward compatibility reasons. From 6.0 onwards, you can define that Tectia ConnectSecure uses the destination IP address received from the tunneled application with setting Transparent Tunnels → Filter Rules → Use host name from the application (in XML configuration: hostname-from-app="yes").

In Port number, enter the port number you want to use for the Secure Shell connection. The default port is 22.


A Secure Shell server program must be listening to the specified port on the remote host computer or the connection attempt will not succeed. If you are unsure which port the remote host computer is listening to, contact the system administrator of the remote host.

User Name

Select Use current user name if the connection should always be made using the currently logged in Windows or Unix user name. This is similar to defining %USERNAME% (note the percent signs) as the user name.

Select Specify user name and enter the user name, if you want to define the user name to be used when connecting to the remote host computer. If you specify %USERNAME% (note the percent signs) as the user name, it will be replaced with the name of the current Windows or Unix user account upon connecting.


Not needed now: In Compression, select the desired compression setting from the drop-down menu. Valid choices are zlib and none. Compression is disabled by default.

Not needed now: In Tunnel using profile, select the desired connection profile from the drop-down menu. Any nested tunnels will be created through the profile. For information on the tunneling features, refer to Chapter 6.

Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps