ssh
Configuration > Security > ssh

Select to use secure shell (ssh) to encrypt all the traffic from workstations.

Note

ssh

Select whether to enable or disable ssh.
If [Enable] is selected, traffic is encrypted all the way from workstations to the device.

ssh Settings

[To Top]

Compression Transfer

Select whether to compress data before sending it.

Port Number

Enter the port number used for SSH connections to the device, using a value between 1024 and 65535. The default is 22.

Timeout

Select whether to terminate ssh connection to the device if no operation is performed from a workstation within a specified time period after the user logs on to the device via SSH.
To not terminate ssh connection, enter "0". To terminate ssh connection, enter the timeout period using a value between 1 and 65535 (seconds). The default is 300.

Login Timeout

Select whether to terminate ssh connection to the device when no logon is performed within a specified time period after the user logs on to the device via SSH.
To not terminate ssh connection, enter "0". To terminate ssh connection, enter the timeout period using a value between 1 and 65535 (seconds). The default is 300.

Public Key

Displays the status of the public key used to encrypt data.
To create or change the public key, click [Create]. The [Create Public Key] page appears.

For details about the [Create Public Key] page

To delete the current public key, click [Delete].

Note

Buttons

[To Top]

[Refresh]

Click to update the currently displayed information.

Note

[OK]

Click to apply the settings.

[Cancel]

Click to cancel the settings.

 

[To Top]