Create SSH Profiles for Sidewinder SSH Proxy
SSH Profiles define custom settings for key exchange, encryption algorithm, and message authentication for SSH connections that use the Sidewinder SSH Proxy.
If the default High Compatibility Profile SSH Profile element meets your needs, it is not necessary to create a custom SSH Profile.
The lists of selected key exchange methods, cipher methods, and message authentication code (MAC) methods are organized in order of preference. You can move selected items up or down in the list.
For more details about the product and how to configure features, click Help or press F1.
Steps
- Select Configuration.
- Browse to .
- Right-click SSH Profiles, then select New SSH Profile.
- In the Name field, enter a unique name.
- On the Key Exchange tab, select one or more key exchange methods, then click Add.
- On the Cipher tab, select one or more cipher methods, then click Add.
- On the MAC tab, select one or more MAC methods, then click Add.
- Click OK.
Next steps
Otherwise, select your custom SSH Profile in the Engine Editor.
SSH Profile Properties dialog box
Use this dialog box to add or change SSH Profile elements.
Option | Definition |
---|---|
General tab | |
Name | Specifies a unique name for the SSH Profile element. |
Comment | Adds a comment for your own reference. |
Category | Shows the assigned category. Click Select to open the Category Selection dialog box. |
Option | Definition |
---|---|
Key Exchange tab | |
Key Exchange Methods | Lists the supported key exchange methods. |
Selected Algorithms | Shows the selected key exchange methods. |
Add | Adds the selected algorithm to the list. |
Remove | Removes the selected algorithm from the list. |
Up | Moves the selected algorithm up in the list. |
Down | Moves the selected algorithm down in the list. |
Option | Definition |
---|---|
Cipher tab | |
Cipher Methods | Lists the supported cipher methods. |
Selected Algorithms | Shows the selected cipher methods. |
Add | Adds the selected algorithm to the list. |
Remove | Removes the selected algorithm from the list. |
Up | Moves the selected algorithm up in the list. |
Down | Moves the selected algorithm down in the list. |
Option | Definition |
---|---|
MAC tab | |
MAC Methods | Lists the supported message authentication code (MAC) methods. |
Selected Algorithms | Shows the selected MAC methods. |
Add | Adds the selected algorithm to the list. |
Remove | Removes the selected algorithm from the list. |
Up | Moves the selected algorithm up in the list. |
Down | Moves the selected algorithm down in the list. |