Use the following procedure to configure Secure Shell connections using the upgraded security protocols.
Secure Shell is a protocol for securely logging onto a remote computer and executing commands. It provides a secure alternative to Telnet and FTP. Secure Shell connections require both server and user authentication. All communications occur over an encrypted communication channel.
To configure a new session
From themenu, select , and click . Or, if a session is already open, choose > .
In the> , respond to the prompts to select the host type and the session type.
For the connection type, select.
On thetab, for , enter the host name.
For> , if you change the Reflection SSH configuration (step 6), Extra! creates an SSH configuration scheme, which appears in this box as the name of the specified host (unless you enter a different name). If you don't change the Reflection SSH configuration, no scheme is created (or required).
For, enter the appropriate name if you do not want to be prompted for a user ID when connecting.
If you want to change your Reflection SSH configuration, click, and in the Reflection Secure Shell Settings dialog box, select the options you want.
(Optional) If you use a digital certificate for authentication, click thetab, and specify the client certificate.
Clickto close the dialog box.
Your changes are saved as the SSH configuration scheme and are in stored in an SSH configuration file.
Specify the remaining options to complete the configuration.
NOTE:To change the security settings, in an open session, choose> , and on the left, click .