The first thing you'll want to do is to add a host. A host is simply a remote device you wish to connect to.
When you start Terimus, either via desktop or mobile, you'll be prompted to add a new host. When you click the New Host button, you'll be presented with a dialog that asks for the following information:
Alias (or Label) - A name to give the connection. This does not necessarily have to match the hostname - it can be any easy to remember title.
Hostname (or Address) - The DNS name or IP address of the server you wish to connect to.
In the mobile versions, you'll have to toggle the SSH or Telnet switches to present additional options. On the desktop version, they will be listed next.
Port - For SSH, this is usually 22, though can vary depending on the Port setting in the server's
/etc/ssh/sshd_config file. For Telnet, this is usually port 23.
Username - The name of your user account on the remote system.
Password - If you wish to use password-based authentication, enter your password in this field.
Key - If you wish to use SSH key authentication, select the key to use. If you haven't added a key yet, please see Adding Your SSH Key.
Tag(s) - In the desktop version, you can enter tags for this host, separated by a comma. In the mobile version, putting a space between the tags will create a new tag.
You'll then see options to select your theme and font. These are optional settings, but recommended to customize your experience.
You can specify additional options while adding a host (see below).
To connect to a host, double click or tap on a defined host entry in the Hosts panel.
In the desktop application, you can click on the top bar in the Hosts panel and type:
ssh user@hostname -p port
In the above example, replace user with your username, hostname with the hostname of the remote system, and port with the port to use. You may omit the -p port portion if using the default SSH port (22).
If you aren't using a key and haven't saved it with the host, you'll be prompted for a password.
A snippet can be ran upon connection to the host. From the Select Snippet screen while adding or editing a host you can choose an existing snippet or add a new one.
For more details, please see our Snippet section.
SSH Agent Forwarding allows your identities to be securely access by remote hosts for further connection to another machine (useful in host chaining or deployments).
Host Chaining allows you to first make a connect to another host before connecting to the host in question. This is useful in situations where your IP changes or for non-publicly accessible hosts.
In this section you can configure an HTTP or SOCKS proxy.
A SOCKS proxy is similar to a regular proxy except that it funnels more than just HTTP packets. A SOCKS proxy operates at a lower level, exchanging TCP and UDP packets between your system and a remote server. This traffic is tunneled over the SSH connection, and therefore encrypted.
Unlike a VPN, a SOCKS proxy doesn't NAT your connection to a remote network - rather it forwards packets as though programs using the network on your local machine were essentially on the remote host. A VPN assigns a new IP address, but with a SOCKS proxy, your local and public IP stays the same, but most traffic from your system appears to come from the remote host.
When configuring a host, specify the Hostname and Port of the SOCKS server, as well as desired username and password. The user/pass may match your SSH connection. If unsure, please consult your server administrator.
In this section you can predefine shell environment variables. Each variable has a name (key) and a value.