SonicOS 7.1 Firewall
- SonicOS 7.1
- About SonicOS
- About Firewall
- Advanced
- Flood Protection
- SSL Control
- Cipher Control
- Real-Time Black List (RBL) Filter
- Use cases
SSH Ciphers
The SSH Ciphers page of Network > Firewall > Cipher Control allows you to specify which cryptographic SSH ciphers SonicOS uses.
Key Exchange Algorithm | Lists the cryptographic algorithms used to exchange cryptographic keys between two parties
The Key Exchange Algorithms ecdh-sha2-nistp256, ecdh-sha2-nistp384, and ecdh-sha2-nistp521 are supported only in SonicOS7.1 Policy mode. |
---|---|
Public Key Algorithm | Lists the asymmetric cryptographic algorithms using pairs of public keys |
Encrypt Algorithm | Lists the encryption algorithms used in secure transfers of files, such as FTP transfers |
MAC Algorithm | Lists the algorithms using a MAC (message authentication code) value to authenticate messages |
To select or deselect SSH ciphers:
- Navigate to Network > Firewall > Cipher Control.
- Click SSH Ciphers.
-
Select the SSH algorithm to use or ignore.
All SSH ciphers are selected by default.
Was This Article Helpful?
Help us to improve our support portal