![]() |
| |||||||||
|
Cipher List With the Cipher List page of the Settings dialog you can control which ciphers can be used in the connection. This selection defines what encryption methods will be available when using the
![]() The following algorithms can be selected:
Click the checkbox next to each algorithm to include or exclude it in the list of available custom algorithms. An algorithm marked with a checkmark is available for use. You can also select the order of preference between the algorithms. Select an algorithm by clicking it with the mouse, and then move it upwards or downwards in the list by clicking on the Up or Down buttons. The checkmarked algorithms that are located on the top of the list are preferred. The SSH Secure Shell for Workstations Windows client will first try to use the first checkmarked algorithm in the connection. If that algorithm is not supported by the remote host computer, the client software will try the next checkmarked algorithm on the list, and so on. To take your list of preferred encryption algorithms into use, select [ Support | Feedback | SSH Home Page | SSH Products ]
Copyright © 2000 SSH Communications Security Corp |