Use the settings on the Encryption tab to configure the encryption algorithms available for use by the Secure Shell connection, and define the order of preference for their use.
Use the arrow buttons to move a selected algorithm up or down in the list.
|
Specify one or more cipher A cipher is an encryption algorithm. The cipher you select determines which mathematical algorithm is used to obscure the data being sent after a successful Secure Shell connection has been established. algorithms to use for encrypting the session, in order of preference. The cipher used for a session is the first item in this list that is also supported by the server. NOTE:If FIPS mode is enabled, the list of available cipher algorithms is restricted to FIPS-compatible algorithms. |
|
Specify a series of HMAC (hash-based message authentication code) algorithms, in order of preference. Secure Shell connections use HMACs to ensure data integrity. The client and server independently compute a hash for each packet of transferred data. If the message has changed in transit, the hash values are different and the packet is rejected. The HMAC used for a session is the first item in this list that is also supported by the server. NOTE:If FIPS mode is enabled, the list of available MAC algorithms is restricted to FIPS-compatible algorithms. |
|
Specify one or more key exchange algorithms by which the client and server negotiate a shared session key, in order of preference. |