Encryption Tab - Advanced Secure Shell Settings

Getting there

Use the settings on the Encryption tab to configure the encryption algorithms available for use by the Secure Shell connection, and define the order of preference for their use.

Use the arrow buttons to move a selected algorithm up or down in the list.

 

Cipher Algorithms

Specify one or more cipher algorithms to use for encrypting the session, in order of preference. The cipher used for a session is the first item in this list that is also supported by the server.

Note: If FIPS mode is enabled, the list of available cipher algorithms is restricted to FIPS-compatible algorithms.

 

HMAC Algorithms

Specify a series of HMAC (hash-based message authentication code) algorithms, in order of preference. Secure Shell connections use HMACs to ensure data integrity. The client and server independently compute a hash for each packet of transferred data. If the message has changed in transit, the hash values are different and the packet is rejected. The HMAC used for a session is the first item in this list that is also supported by the server.

Note: If FIPS mode is enabled, the list of available MAC algorithms is restricted to FIPS-compatible algorithms.

 

Key Exchange Algorithms

Specify one or more key exchange algorithms by which the client and server negotiate a shared session key, in order of preference.

Related Topics

Secure Shell Connection Method

Advanced Secure Shell Settings

Authentication Tab - Advanced Secure Shell Settings

General Tab - Advanced Secure Shell Settings

Set Up Secure Shell (SSH) Connections