Table of Contents

Search

  1. Preface
  2. Introduction
  3. Dashboard
  4. Resources
  5. Workflows
  6. Task Reference
  7. Services Overview
  8. Users
  9. Logs and Reports
  10. Encryption
  11. System
  12. Appendix
  13. Glossary Terms

Managed File Transfer User Guide

Managed File Transfer User Guide

SSH Algorithms

SSH Algorithms

The options on the Algorithms fold allow customization of the supported algorithms for each SSH connection. The entries in the left column are the available algorithms and the entries in the right column are the selected algorithms. By selecting one or more algorithms, only those will be used during the SSH communication. If no algorithms are selected for a section, the defaults will be used. The Default Algorithms are listed on the Algorithms tab on the SSH Server.
During the handshake process, the selected options are negotiated with the server, starting with the entry at the top of the list. The first cipher and mac and compression algorithms to match an algorithm supported by the server will be used for the connection. If your company prefers certain algorithms over others, use the arrow buttons to move that cipher to the Selected column and to set the order with the most preferred algorithm at the top. Press the CTRL key while clicking to select multiple entries.

0 COMMENTS

We’d like to hear from you!