TrueNAS CORETrueNAS CORE Nightly Development Documentation
This content follows experimental early release software. Use the Product and Version selectors above to view content specific to a stable software release.

SSH Connections


Name and Method

NameName of this SSH connection. SSH connection names must be unique.
Setup MethodManual requires configuring authentication on the remote system. This can include copying SSH keys and modifying the root user account on that system.

Semi-automatic only works when configuring an SSH connection with a remote TrueNAS system. This method uses the URL and login credentials of the remote system to connect and exchange SSH keys.


TrueNAS URLHostname or IP address of the remote system. A valid URL scheme is required. Example:
UsernameUsername for logging in to the remote system.
PasswordUser account password for logging into the remote system.
Private KeyChoose a saved SSH Keypair or select Generate New to create a new keypair and use it for this connection.

More Options

CipherStandard is most secure, but has the greatest impact on connection speed.

Fast is less secure than Standard but can give reasonable transfer rates for devices with limited cryptographic speed.

Disabled removes all security in favor of maximizing connection speed. Disabling the security should only be used within a secure, trusted network.
Connect TimeoutTime (in seconds) before the system stops attempting to establish a connection with the remote system.