Create SSH Profiles for Sidewinder SSH Proxy

SSH Profiles define custom settings for key exchange, encryption algorithm, and message authentication for SSH connections that use the Sidewinder SSH Proxy.

If the default High Compatibility Profile SSH Profile element meets your needs, it is not necessary to create a custom SSH Profile.

The lists of selected key exchange methods, cipher methods, and message authentication code (MAC) methods are organized in order of preference. You can move selected items up or down in the list.

For more details about the product and how to configure features, click Help or press F1.

Steps

  1. Select Configuration.
  2. Browse to Other Elements > Sidewinder Elements > SSH Profiles.
  3. Right-click SSH Profiles, then select New SSH Profile.
  4. In the Name field, enter a unique name.
  5. On the Key Exchange tab, select one or more key exchange methods, then click Add.
  6. On the Cipher tab, select one or more cipher methods, then click Add.
  7. On the MAC tab, select one or more MAC methods, then click Add.
  8. Click OK.

Next steps

If you want to allow connections only to specific trusted servers, create SSH Known Hosts.

Otherwise, select your custom SSH Profile in the Engine Editor.

SSH Profile Properties dialog box

Use this dialog box to add or change SSH Profile elements.

Option Definition
General tab
Name Specifies a unique name for the SSH Profile element.
Comment Adds a comment for your own reference.
Category Shows the assigned category. Click Select to open the Category Selection dialog box.
Option Definition
Key Exchange tab
Key Exchange Methods Lists the supported key exchange methods.
Selected Algorithms Shows the selected key exchange methods.
Add Adds the selected algorithm to the list.
Remove Removes the selected algorithm from the list.
Up Moves the selected algorithm up in the list.
Down Moves the selected algorithm down in the list.
Option Definition
Cipher tab
Cipher Methods Lists the supported cipher methods.
Selected Algorithms Shows the selected cipher methods.
Add Adds the selected algorithm to the list.
Remove Removes the selected algorithm from the list.
Up Moves the selected algorithm up in the list.
Down Moves the selected algorithm down in the list.
Option Definition
MAC tab
MAC Methods Lists the supported message authentication code (MAC) methods.
Selected Algorithms Shows the selected MAC methods.
Add Adds the selected algorithm to the list.
Remove Removes the selected algorithm from the list.
Up Moves the selected algorithm up in the list.
Down Moves the selected algorithm down in the list.