Select to use secure shell (ssh) to encrypt all the traffic from UNIX workstations.
Note
Select whether ssh is active or inactive.
If Active is selected, traffic is encrypted all the way from workstations to the device.
Select whether to compress data before sending it.
Enter the port number used for SSH connections to the device, using a value between 1024 and 65535. The default is 22.
Select whether to terminate ssh connection to the device if no operation is performed from a workstation within a specified time period after the user logs on to the device via SSH.
To not terminate ssh connection, enter "0".
To terminate ssh connection, enter the timeout period using a value between 1 and 65535 (seconds).
The default is 300.
Select whether to terminate ssh connection to the device when no login is performed within a specified time period after the user logs on to the device via SSH.
To not terminate ssh connection, enter "0".
To terminate ssh connection, enter the timeout period using a value between 1 and 65535 (seconds).
The default is 300.
Select the encryption algorithm type for ssh.
Note
Displays the status of the public key used to encrypt data.
To create or change the public key, click Create. The Create Public Key page appears.
To delete the current public key, click Delete.
Note
Displays the key length of the public key.
Displays the fingerprint of the public key.
Click to update the currently displayed information.
Note
Click to apply the settings.
Click to cancel the settings.