Connection _ SSH _ Security
Encryption
Encryption algorithms are used to encrypt and decrypt network traffics. Users may select a preferred encryption algorithm from the list. If <Cipher List> is selected from the list, multiple algorithms may be attempted in the order appearing in the list. To edit the list of <Cipher List>, click [Edit].
MAC (Message Authentication Code)
MAC is added in SSH2 for greater security and to ensure data integrity. If <MAC List> is selected from the list, multiple algorithms are tried in the order appearing in the list. To edit the list of <MAC List>, click [Edit].
Key exchange
Users can select the intial Key Exchange for the SSH connection. The desired algorithm can be selected from the list. If the server does not support the selected algorithm, the connection will fail.