Use the following procedure to configure Secure Shell connections using the upgraded security protocols.
Secure Shell is a protocol for securely logging onto a remote computer and executing commands. It provides a secure alternative to Telnet and FTP. Secure Shell connections require both server and user authentication. All communications occur over an encrypted communication channel.
To configure a new session
From the Start menu, select Extra!, and click Create a new session. Or, if a session is already open, choose File > New Session.
In the New Session > Wizard, respond to the prompts to select the host type and the session type.
For the connection type, select SSH.
On the General tab, for Host, enter the host name.
For SSH > configuration scheme, if you change the SSH configuration (step 6), Extra! creates an SSH configuration scheme, which appears in this box as the name of the specified host (unless you enter a different name). If you don't change the SSH configuration, no scheme is created (or required).
For User ID, enter the appropriate name if you do not want to be prompted for a user ID when connecting.
If you want to change your SSH configuration, click Advanced, and in the Secure Shell Settings dialog box, select the options you want.
(Optional) If you use a digital certificate for authentication, click the User Keys tab, and specify the client certificate.
Click OK to close the Secure Shell Settings dialog box.
Your changes are saved as the SSH configuration scheme and are in stored in an SSH configuration file.
Specify the remaining options to complete the configuration.
NOTE:To change the security settings, in an open session, choose Options > Settings, and on the left, click Connection.