ssh
Device Management > Configuration > Security > ssh

Select to use secure shell (ssh) to encrypt all the traffic from UNIX workstations.

Note

ssh

Specify whether ssh is active or inactive.
If Active is selected, traffic is encrypted all the way from workstations to the device.

ssh Settings

To Top of the Page

Compression Transfer

Specify whether to compress data before sending it.

Port Number

Enter the port number used for SSH connections to the device, using a value between 1024 and 65535. The default is 22.

Timeout

Specify whether to terminate ssh connection to the device if no operation is performed from a workstation within a specified time period after the user logs in to the device via SSH.
To not terminate ssh connection, enter "0". To terminate ssh connection, enter the timeout period using a value between 1 and 65535 (seconds). The default is 300.

Login Timeout

Specify whether to terminate ssh connection to the device when no login is performed within a specified time period after the user logs in to the device via SSH.
To not terminate ssh connection, enter "0". To terminate ssh connection, enter the timeout period using a value between 1 and 65535 (seconds). The default is 300.

Encryption Algorithm

Select the encryption algorithm type for ssh.

Note

Public Key

Displays the status of the public key used to encrypt data.
To create or change the public key, click Create. The Create Public Key page appears.

For details about the Create Public Key page

To delete the current public key, click Delete.

Note

Key Length

Displays the key length of the public key.

fingerprint

Displays the fingerprint of the public key.

Buttons

To Top of the Page

Refresh

Click to update the currently displayed information.

Note

OK

Click to apply the settings.

Cancel

Click to cancel the settings.

 

To Top of the Page