SSH Tectia

Defining Default Settings

The Defaults page allows you to add default settings for authentication (Defining Authentication), ciphers (Defining Ciphers), MACs (Defining MACs) and servers (Defining Servers).

If the same settings are defined in a connection profile, they override the default settings.

Defining Authentication

Authentication methods for Client and Connector

Figure 4.2. Authentication methods for Client and Connector

Possible methods for general authentication are the following:

  • Password: Use a password for authentication.

  • Public-key: Use public-key authentication.

  • Keyboard-interactive: Keyboard-interactive is designed to allow the Secure Shell client to support several different types of authentication methods, including RSA SecurID and PAM. For more information on keyboard-interactive, see SSH Tectia Client/Server Product Description.

  • GSSAPI: GSSAPI (Generic Security Service Application Programming Interface) is a common security service interface that allows different security mechanisms to be used via one interface. For more information on GSSAPI, see SSH Tectia Client/Server Product Description.

    When connecting from a Windows 5.x client to a Windows 4.x server using GSSAPI authentication, if authentication fails although GSSAPI has been correctly configured, you may have to disable the LMHOSTS lookup on the client-side computer:

    1. Select Control Panel → Network Connections.

    2. In Local Area Connection, right-click and select Properties.

    3. In the Local Area Connection Properties dialog box, General tab, select Internet Protocol (TCP/IP) and click the Properties button.

    4. In the Internet Protocol (TCP/IP) Properties dialog box, in the General tab, click the Advanced... button.

    5. In the Advanced TCP/IP Settings dialog box, in the WINS tab, clear the Enable LMHOSTS lookup check box.

    6. Restart the client-side computer.

Defining Ciphers

Select the Use defaults check box to use defaults, or define a cipher list using the arrow buttons.

Defining a cipher list

Figure 4.3. Defining a cipher list

Defining MACs

Defining a MAC list

Figure 4.4. Defining a MAC list

Select the Use defaults check box to use defaults, or define a MAC list using the arrow buttons.

Defining Servers

Defining a server

Figure 4.5. Defining a server

Use hardcoded values

Select to use hardcoded values for the default server.

Transport distribution

Select a level between 1-8.

Connection timeout

Select 0 to disable. The default value is 5 seconds. Setting a longer time allows the connection to the server to remain open even after a session (for example, sshg3) is closed. During this time, a new session to the server can be initiated without re-authentication.

Show server banner

Select to show a banner when connecting.