Casio Naurtech CETerm Ver.5.5 User Manual User Manual

Page 42

Advertising
background image

N

AURTECH

E

MULATORS

&

W

EB

B

ROWSER FOR

W

INDOWS

CE

/

W

INDOWS

M

OBILE




CETerm | CE3270 | CE5250 | CEVT220

Page 42


Prefer SSH-2 Protocol: Enable this option if you would like to connect to your
VT host using SSH protocol version 2. The default setting is On.

NOTE: If both SSH-1 and SSH-2 options are off, CETerm will first try to connect
using SSH2 protocol and then fall back to SSH-1 protocol.


Auto OK New Host keys:
Automatically accept the host keys presented by the
server. Enabling this option will minimize the amount of interaction that is
required on part of a user. The default setting is Off.

WARNING: Enabling this option reduces security because the user does not
verify that the server being connected to is the intended destination. For greatest
security the user should verify that the server credentials presented match the
intended server.


Auto OK Changed Host keys:
Automatically accept changed host key
presented by the server. Enabling this option will minimize the amount of
interaction that is required on part of a user. The default setting is Off.

WARNING-WARNING-WARNING: Enabling this option reduces security
because the user does not verify that the server being connected to is the
intended destination. A changed host key may indicate a ―man-in-the-middle‖
attack, or it may be that the server administrator has simply changed the server
host key. For greatest security the user should verify that the server credentials
presented match the intended server.


Try Keyboard Authentication:
This option is for SSH-2 protocol only. It is a
flexible authentication method using an arbitrary sequence of requests and
responses. This method is not only useful for challenge/response mechanisms
such as S/Key, but it can also be used for asking the user for a new password
when the old one has expired. This option is On by default.

Try TIS Authentication SSH-1:
TIS authentication is a simple
challenge/response form of authentication available in SSH-1 protocol only. You
might use it if you were using S/Key one-time passwords, or if you had a physical
security token that generated responses to authentication challenges.

With this option enabled, CETerm will attempt this authentication if the server is
willing to try them. You will be presented with a challenge string (which will be
different every time) and must supply the correct response in order to log in. If
your server supports this, you should talk to your system administrator about
precisely what form these challenges and responses take. This option is Off by
default.

Auth Username Changeable: The SSH-2 protocol allows change of username
during authentication, but does not make it mandatory for SSH-2 servers to
accept them. In particular, OpenSSH does not accept a change of username;
once you have sent one username, it will reject attempts to try to authenticate as
another user.

Enable this option if your server accepts changes to username in its
authentication process. This option is Off by default.

Advertising
This manual is related to the following products: