Select to use secure shell (ssh) to encrypt all the traffic from UNIX workstations.
Note
Select whether ssh is active or inactive.
If [Active] is selected, traffic is encrypted all the way from workstations to the device.
Select whether to compress data before sending it.
Enter the port number used for SSH connections to the device, using a value between 1024 and 65535. The default is 22.
Select whether to terminate ssh connection to the device if no operation is performed from a workstation within a specified time period after the user logs on to the device via SSH.
To not terminate ssh connection, enter "0".
To terminate ssh connection, enter the timeout period using a value between 1 and 65535 (seconds).
The default is 300.
Select whether to terminate ssh connection to the device when no logon is performed within a specified time period after the user logs on to the device via SSH.
To not terminate ssh connection, enter "0".
To terminate ssh connection, enter the timeout period using a value between 1 and 65535 (seconds).
The default is 300.
Displays the status of the public key used to encrypt data.
To create or change the public key, click [Create]. The [Create Public Key] page appears.
To delete the current public key, click [Delete].
Note
Click to update the currently displayed information.
Note
Click to apply the settings.
Click to cancel the settings.