Advanced Client Use
To establish an SSH connection, you must fill in the following Connection fields in the Properties window. These include:- Host Name
- The name of the remote SSH server machine to which you want to connect.
- User Name
- Your username on the remote SSH server machine. If you're using public key (RSA) authentication, this username must belong to an account that contains your public key.
- Port Number
- The TCP port for SSH connections. Virtually all SSH clients and servers operate on port 22. Unless you plan to connect to a nonstandard SSH server, you don't need to change this. ["Selecting a remote port"]
- SSH Protocol
- You may require SSH-1 or SSH-2, or select Automatic to let the program figure it out based on the server's response.
Data Compression
F-Secure SSH can transparently compress and uncompress the data traveling over an SSH connection, which can speed up your connection. ["Data Compression"]In the Properties window, choose Connection, and check the box labeled Compression. There's no way to set different compression levels as in SSH1.Debugging with Verbose Mode
Is your SSH session not working as expected? Turn on verbose mode so status messages are printed in the window as your session runs. This can help you locate and solve problems.In the Properties window, select Appearance and check the box labeled Verbose Mode. The next time you connect, you'll see messages like this:debug: connecting ... debug: addresses 219.243.169.50 debug: Registered connecting socket: 12 debug: Connection still in progress debug: Marked name resolver 1 killed debug: Replaced connected socket object 12 with a stream
Verbose mode is much like its counterpart in the Unix SSH products. ["Logging and Debugging"] It can be an indispensable tool for diagnosing problems with your connection.
SOCKS Proxy Server
F-Secure SSH Client supports connecting through SOCKS Version 4 proxy servers. ["SOCKS proxy support"] On the Properties window, select Socks and fill in the hostname or IP address of the proxy server machine and the port number on the proxy (the usual SOCKS port is 1080).Accepting Host Keys
Every SSH server has a unique host key that represents the server's identity, so SSH clients can verify that they are speaking with the actual server and not an impostor. ["Known Hosts"] F-Secure SSH Client keeps track of all host keys it encounters. The keys are stored in the Windows registry.If you want F-Secure SSH Client to reject host keys it hasn't seen before, visit the Properties window and select Security. A checkbox is available to set this option.Additional Security Features
Normally, F-Secure SSH Client keeps track of hostnames, usernames, filenames, and terminal input and output that it encounters. Any time you want to purge this information from the program (say, to prevent a third party from viewing it on your computer), visit the Properties window and select Security. The buttons on this window will delete the information.Secure File Transfer with SFTP
A graphical file transfer program, F-Secure SSH FTP, is also included. Its user interface should be familiar to anyone who has used a graphical FTP client, except that you must set up authentication via SSH. We don't document this program, as it comes with online help, but we did want to mention it.Command-Line Tools
F-Secure SSH comes with a graphical terminal program as well as command-line clients using the SSH-2 protocol. These includessh2
, scp2
, and sftp2
. These programs are much the same as their counterparts in SSH2, as described in "Basic Client Use", except:
- Some of the Unix command-line options aren't supported. Type the program name by itself (e.g.,
ssh2
) to see the current list of options. - Key files aren't supported; these programs read keys from the Windows registry, just as F-Secure SSH Client does.
C:\> ssh2 server.example.com mycommand