Xshell User Guide Secure Terminal Emualtor NetSarang Computer, Inc. Copyright © 2015 NetSarang Computer, Inc. All rights reserved. Xshell Manual This software and various documents have been produced by NetSarang Computer, Inc. and are protected by the Copyright Act. Consent from the copyright holder must be obtained when duplicating, distributing or citing all or part of this software and related data. This software and manual are subject to change without prior notice for product functions improvement. Xlpd and Xftp are trademarks of NetSarang Computer, Inc. Xmanager and Xshell are registered trademarks of NetSarang Computer, Inc. Microsoft Windows is a registered trademark of Microsoft. UNIX is a registered trademark of AT&T Bell Laboratories. SSH is a registered trademark of SSH Communications Security. Secure Shell is a trademark of SSH Communications Security. This software includes software products developed through the OpenSSL Project and used in OpenSSL Toolkit. NetSarang Computer, Inc. (143-721) Level 16, 85 Gwangnaruro 56 gil, Gwangjin-gu, Seoul, Korea (TechnoMart 21, Gueui-dong) http://www.netsarang.com/ Contents About Xshell ............................................................................................................................................... 1 Key Functions ........................................................................................................... 1 Minimum System Requirements .................................................................................. 3 Install and Uninstall ................................................................................................... 3 License Agreement .................................................................................................... 4 Consent to Genuine Xshell Use .............................................................................. 4 Consent to Xshell Tryout Edition Use ...................................................................... 6 Start ................................................................................................................................................................... 7 Create Session .......................................................................................................... 7 Connect to Remote Host ............................................................................................ 8 Exit Xshell ................................................................................................................ 9 Session Management ............................................................................................................................... 11 Session Management ............................................................................................... 11 Session Properties ................................................................................................... 12 Connection ........................................................................................................ 13 Add a short description about the session. Connection > Authentication .................. 13 Connection > Authentication > Login Prompts ...................................................... 14 Connection > Login Scripts ................................................................................. 14 Connection > SSH ............................................................................................. 14 Connection > SSH > Security ............................................................................. 15 Connection > SSH > Tunneling ........................................................................... 15 Connection > SSH > SFTP .................................................................................. 15 Connection > TELNET ......................................................................................... 15 Connection > RLOGIN ........................................................................................ 16 Connection > SERIAL ......................................................................................... 16 Connection > PROXY .......................................................................................... 16 Connection > Keep Alive ..................................................................................... 16 Terminal ........................................................................................................... 16 Terminal > Keyboard .......................................................................................... 17 Terminal > VT Mode ........................................................................................... 18 Terminal > Advanced ......................................................................................... 18 Appearance ....................................................................................................... 19 Appearance > Margins ....................................................................................... 20 Advanced .......................................................................................................... 20 Advanced > Tracing ........................................................................................... 20 Advanced > Logging .......................................................................................... 20 ZMODEM .......................................................................................................... 21 Export .................................................................................................................... 22 Import ................................................................................................................... 22 Contents | 1 Connection .................................................................................................................................................... 23 Connection without Sessions .....................................................................................23 Connection with Sessions..........................................................................................23 Serial Connection .....................................................................................................24 Connection with MIT Kerberos ...................................................................................24 Proxy Setting...........................................................................................................25 Security .......................................................................................................................................................... 26 Public Key User Authentication ..................................................................................26 User Keys Dialog Box ..........................................................................................27 Host Key Management ..............................................................................................28 SSH Security Warning Dialog Box .........................................................................28 Host Keys Dialog Box ..........................................................................................28 Tab Management........................................................................................................................................ 29 Tab .........................................................................................................................29 Tab Group ...............................................................................................................29 Tunneling Service ...................................................................................................................................... 30 TCP/IP Port Forwarding .............................................................................................30 X11 Forwarding .......................................................................................................31 SOCKS4/5 Dynamic Port Forwarding ..........................................................................32 Instant Tunneling .....................................................................................................32 Terminal Window Operations ............................................................................................................... 34 Copy and Paste ........................................................................................................34 Find String ..............................................................................................................35 Font Change ............................................................................................................35 Font Color and Background Color Setting....................................................................36 Cursor Change.........................................................................................................37 Window Handling .....................................................................................................38 Multi-session Handling ..............................................................................................38 Quick Command Sets Setting ....................................................................................39 Terminal Output Encoding Change .............................................................................41 Advanced Terminal Options Setting ............................................................................41
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages78 Page
-
File Size-