Previous Topic

Next Topic

Book Contents

Book Index

Specifying MACs, ciphers, and algorithms

You can control which MACs and ciphers are used by a particular SSH listener.

  1. From the top menu, select Server > Listeners. The Listeners page opens.
  2. Click the IP address of the listener you want to open. The Edit Listener page opens.

    At the bottom of the page, click SSH Settings. The Listener Encryption Settings (SSH) page opens.

  1. Select the radio button next to the name of the MAC or cipher you want to remove.
  2. Click Remove. The page reloads with the selected MAC or cipher removed from the list.
  1. Click Add below the list of ciphers. The Add Cipher page opens.
  2. Select the cipher you want to add.

    Note: If nothing appears in the list, all available MACs are already assigned to the SSH listener.

  3. Click Save.
  1. Click Add below the list of MACs. The Add MAC page opens.
  2. Select the MAC you want to add.

    Note: If nothing appears in the list, all available MACs are already assigned to the SSH listener.

  3. Click Save.

In This Section

To Add a MAC to an SSH listener

See Also

Using SSH

How does SSH work?

Understanding SSH terminology

Selecting methods of authentication

Selecting an SSH host key

Selecting SSH user keys