Directory › Connections › SSH

How to Add an SSH Connection in CyberVision

Purpose

Create an SSH connection to access a Linux/Unix server through the portal.

Prerequisites

  • Permission to create connections in the Connections module.
  • SSH server host/IP.
  • SSH port (default 22, if not customized).
  • Valid credentials (username/password or equivalent credential method).
  • (Optional) Proxy/jump host, if required by your environment.

Step-by-step

1) Create the connection

1. Open Connections.

2. Click Add.

2) Set general connection details

In the Connection section:

  • Name: define a clear name (example: SSH - App Server 01).
  • Protocol: select SSH.

Why?

  • Name improves searchability, standardization, and daily operations.
  • Protocol selects the technical connection engine (SSH vs RDP/Kubernetes).

3) Configure Proxy

In the Proxy section:

  • Hostname: proxy/jump host.
  • Port: proxy port.

Why?

  • In segmented networks, SSH servers are often not directly exposed.
  • A proxy enables controlled and auditable access without broad network exposure.

4) (Optional) Apply usage restrictions

In Additional Connection Restrictions:

  • Allowed date/time windows.
  • Allowed/blocked schedules.
  • Allowed/blocked source hosts.

Why?

  • Reduces attack surface.
  • Enforces compliance (access only in approved windows).
  • Prevents out-of-context or unauthorized use.

5) Configure SSH protocol parameters

In ssh: Protocol Parameters:

Network

  • Hostname: server IP/DNS (example: 10.17.17.109).
  • Port: 22 (or custom SSH port).

Authentication

  • Username: remote account username.
  • Password: remote account password (when applicable).

Why?

  • Hostname/Port define the exact technical destination.
  • Username/Password define identity for host authentication.

6) (Optional) Enable recordings

In the Recordings section:

  • Enable session recording
  • Enable keystroke recording

Why?

  • Provides forensic auditability and command traceability.
  • Helps with incident analysis, compliance, and operational reviews.

7) Save

  • Click Save.

Post-creation validation

1. Confirm the connection appears in the Connections list.

2. Open the connection and validate:

  • connectivity,
  • authentication,
  • functional shell prompt,
  • recording behavior (if enabled).

Best practices

  • Use a naming standard: SSH - <Team> - <Server>.
  • Prefer private network + proxy instead of direct exposure.
  • Apply source/time restrictions for sensitive access.
  • Periodically review and remove/disable unused connections.
Was this helpful?
Yes: 0 · No: 0