Options Tab  

Encryption
Encryption algorithms are used to encrypt and decrypt network traffic. Users can select their preferred algorithms from the list. If <Cipher List> is selected, several algorithms can be tried in order of preference. To modify <Cipher List>, click [Edit].

MAC
MAC(Message Authentication Code) ensures that data transferred through a network is not changed by a third person. It provides increased security of the SSH2 protocol over SSH1. Users can select their preferred MAC algorithms from the list. If <MAC List> is selected, several algorithms can be tried in order of preference. To modify <MAC List>, click [Edit].

Key Exchange
These are the options for the SSH initial key exchange. User can select the desired algorithm from the list. Keep in mind that if the server does not support the selected algorithm, the connection will fail.

Compress network data(using ZLIB compression)
Select this option to compress all data traffic with the ZLIB algorithm. Compression will provide better performance in a slow network environment. Depending on the X application being used, network data can be reduced between 15%-80%.

Allocate a terminal before executing the command
This option is selected when you want to allocate a virtual terminal on the remote host and then run a command on the terminal. Virtual terminals are required by several X applications. When virtual terminals are allocated, shell environment variables are set as per the general login envirorment.