Use the following procedure to configure Secure Shell connections using the upgraded security protocols.
To configure a new session
For the connection type, select
.On the
tab, for , enter the host name.For
> , if you change the SSH configuration (step 6), Extra! creates an SSH configuration scheme, which appears in this box as the name of the specified host (unless you enter a different name). If you don't change the SSH configuration, no scheme is created (or required).For
, enter the appropriate name if you do not want to be prompted for a user ID when connecting.If you want to change your SSH configuration, click
, and in the Secure Shell Settings dialog box, select the options you want.(Optional) If you use a digital certificate for authentication, click the
tab, and specify the client certificate.Click
to close the Secure Shell Settings dialog box.Your changes are saved as the SSH configuration scheme and are in stored in an SSH configuration file.
Specify the remaining options to complete the configuration.
NOTE:To change the security settings, in an open session, choose
> , and on the left, click .