SSH access method
To configure an SSH access method:
- From the Services panel, choose Secure Equipment Access > System Management > Network Devices.
- Open the Network Device Details screen and click on a device name that is listed in the Connected Clients table to open the Connected Client Details page.
Note: For detailed information on adding connected clients, see Add Network Devices and Connected Clients to a group.
4. Click Add Access Method.
5. Choose SSH from the Access Method list.

Connected Client Details
- Client Name: IP Address of connected client (Read-Only)
- IP Address/Host Name: IP Address of connected client (Read-Only)
Access Method Details
- Access Method: SSH
- Port: (Optional) Enter the port number of the client device.
- Session Timeout (In seconds): (Optional) Enter the session timeout in seconds.
Advanced Settings: Complete the advanced setting based on the Access Method chosen.
- Color Scheme: The color scheme used in the terminal session default is gray-black.
- Font Size: Choose the size from the drop-down list default is 12 pt. (Range 10, 12, 14, 18, 24, 36 pts)
- Scrollback: Provides the maximum size of the limit for the terminal scrollback buffer limit default value is 1000.
- Advanced Parameters: Provides extra information on the access method.

External Equipment Management (Enabled)
- Managed Connected Clients: elect the additional devices that will be managed by this device. Only subtended devices added to the network device as Connected Clients in EDM can be chosen.
Credential Details:
- Username: Enter a valid username.
- Password: Enter a valid password.
Access Name: Access Name is pre-populated based on the information above, and is editable if desired. If the name already exists, it will be automatically appended with a number. for example, Access Name (2).
- Name: The pre-populated or customized name.
- Description: Maximum length is 150 characters.
When the access method is complete, click Add Access Method.
Return to the SEA main menu and choose Access Management to give users access to the remote sessions where the appropriate access method(s) reside.