From the top menu, select Server > Listeners. The Listeners page opens.
Click the IP address of the listener you want to open. The Edit Listener page opens.
At the bottom of the page, click SSH Settings. The Listener Encryption Settings (SSH) page opens.
The following settings apply only to SSH listeners. For information about encryption settings for FTP listeners, see Listener Encryption Settings (SSL).
RSA host key. Displays the RSA host key applied to the current listener. Host keys are offered to the client by the server in order to prove the server's identity. To select an RSA host key, click Select.
DSA host key. Displays the DSA host key applied to the current listener. Host keys are offered to the client by the server in order to prove the server's identity. To select an DSA host key, click Select.
Ciphers Associated with this Listener
This list contains the encryption ciphers associated with this listener. Ciphers are used to encrypt packets sent between the client and server.
Cipher name. Displays the name of the cipher.
Priority. Displays the priority of the cipher relative to the other ciphers in the list. When a connection to this listener is negotiated, the ciphers are presented according to priority. Select a cipher, then click Move Up or Move Down to change its priority.
Add. Click to add a associate additional ciphers with this listener.
Remove. Click to remove the selected cipher from the list.
MACs Associated with this Listener
This list contains all of the MACs (Message Authentication Codes) this listener supports. After a client and server agree on a MAC, it is used to verify the integrity of packets sent between the two.
MAC name. Displays the name of the MAC.
Priority. Displays the priority of the MAC relative to the other MACs in the list. When a connection to this listener is negotiated, the MACs are presented according to priority. Select a MAC, then click Move Up or Move Down to change its priority.
Add. Click to add a associate additional MACs with this listener.
Remove. Click to remove the selected MACs from the list.
Key Exchange Algorithms Associated with this Listener
Diffie-Hellman algorithm name. Displays the name of the Diffie-Hellman algorithm.
Priority. Displays the priority of the Diffie-Hellman algorithm relative to the other Diffie-Hellman algorithms in the list. When a connection to this listener is negotiated, the Diffie-Hellman algorithms are presented according to priority. Select a Diffie-Hellman algorithm, then click Move Up or Move Down to change its priority.
Add. Click to add a associate additional Diffie-Hellman algorithms with this listener.
Remove. Click to remove the selected Diffie-Hellman algorithms from the list.
Other Settings
Use zlib compression (selected by default). If selected, the server will compress any communication sent from this listener to a client, reducing bandwidth consumption.
Force key re-exchange. If selected, the server requires the client to renegotiate the SSH encryption keys after 1GB of data is transferred or an hour passes, whichever comes first. If the client fails to renegotiate the keys properly, the connection is closed.
Note: If Force key re-exchange is cleared, the server still negotiates new keys at the client's request.
Authentication method. Select the user authentication methods to allow for this listener.
Password (selected by default). If selected, this listener will accept password authentication.
Public key (selected by default). If selected, this listener will accept public key authentication. For public key authentication to work, you must also associate a key with each user who will use this authentication method.