ssh
Configuration > Security > ssh

Select to use secure shell (ssh) to encrypt all the traffic from UNIX workstations.

Note

ssh

Select whether ssh is active or inactive.
If [Active] is selected, traffic is encrypted all the way from workstations to the device.

ssh Settings

To Top

Compression Transfer

Select whether to compress data before sending it.

Port Number

Enter the port number used for SSH connections to the device, using a value between 1024 and 65535. The default is 22.

Timeout

Select whether to terminate ssh connection to the device if no operation is performed from a workstation within a specified time period after the user logs on to the device via SSH.
To not terminate ssh connection, enter "0". To terminate ssh connection, enter the timeout period using a value between 1 and 65535 (seconds). The default is 300.

Login Timeout

Select whether to terminate ssh connection to the device when no logon is performed within a specified time period after the user logs on to the device via SSH.
To not terminate ssh connection, enter "0". To terminate ssh connection, enter the timeout period using a value between 1 and 65535 (seconds). The default is 300.

Public Key

Displays the status of the public key used to encrypt data.
To create or change the public key, click [Create]. The [Create Public Key] page appears.

For details about the [Create Public Key] page

To delete the current public key, click [Delete].

Note

Buttons

To Top

[Refresh]

Click to update the currently displayed information.

Note

[OK]

Click to apply the settings.

[Cancel]

Click to cancel the settings.

 

To Top