SSH Communications Security
Index
SSH Home page
Previous Next Up [Contents] [Index]

    Introduction >>
    Configuration >>
        Saving Settings
        Multiple Settings Files
        Loading Settings
        Profile Settings >>
            Connection
            Authentication
            Cipher List
            Colors
            Keyboard
            Keymap Editor
            Tunneling
        Global Settings>>
        Customize
    Connecting >>
    Terminal Window >>
    File Transfer >>
    Toolbar Reference >>
    Menu Reference >>
    Advanced Information >>
    Troubleshooting >>
    Appendices >>

Connection

The protocol settings used in the connection are configured using the Connection page of the Settings dialog. Any changed connection settings will take effect the next time you login.


connection-page-2.gif
Figure : The Connection page of the Settings dialog.

  • Host Name

    Type the name of the remote host computer which you will connect to using this profile.

  • User Name

    Type the user name you want to use when connecting to the remote host computer.

  • Port Number

    Type the port number you want to use for the ssh2 connection. The default port is 22.

    Note: that an sshd2 daemon program must be listening on the specified port on the remote host computer or the connection attempt will not succeed. If you are unsure of which port the remote host computer is listening to, contact the system administrator of the remote host.

  • Encryption Algorithm

    Select the desired encryption algorithm from the dropdown menu. Valid choices are 3DES, Blowfish, Twofish, AES, Arcfour, and CAST. You can also select whatever default that is used by the remote host computer, use no enryption (none) at all, or create your own customized cipher list. For more information on the Cipher List option, see section Cipher List.

    For the AES and Twofish algorithms you can also choose the strength of encryption, ie. how many bits will be used. Greater values are more secure, but slower to use. Possible values are 128, 192 or 256 bits.

    Note: If you select none as the encryption algorithm, the communications for this profile will not be encrypted and all information will be sent as plaintext. The none encryption method is not secure and is not recommended. Use it only if you are sure of what you are doing. A warning dialog will be displayed, if you select this option.

  • MAC Algorithm

    Select the desired Message Authentication Code (MAC) algorithm (hash algorithm) from the dropdown menu. Valid choices are HMAC-MD5 and HMAC-SHA1. You can also select whatever default that is used by the remote host computer, or select to use no message authentication code at all (none). If you select not to use any MAC algorithm, a confirmation dialog will be displayed.

  • Compression

    Select the desired compression setting from the dropdown menu. Valid choices are zlib and none.

  • Terminal Answerback

    Select the desired terminal answerback from the dropdown menu. Possible choices are ansi, vt100, vt102, vt220, vt320 and xterm.

  • Connect through Firewall

    Check the check box if you are connecting through a firewall. For more information on the firewall settings, see section Firewall.

  • Request Tunnels Only (Disable Terminal)

    Check the Request Tunnels Only check box if you wish to only set up the specified tunnels and not request a terminal or file transfer session.

  • Default SFTP Directory

    Type the path to the directory that you want to use as the default local directory for Secure File Transfer operations.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2001 SSH Communications Security Corp
All rights reserved.
Copyright Notice