Configuring Insecure Algorithms
You can enable and disable insecure algorithms as needed.
Procedure
- Log in to your bastion host.
- Choose System > System Config > Security.
- On the right of the Algorithm Config area, click Edit. In the displayed dialog box, enable this function.
After this function is enabled, SSH allows the use of insecure algorithms for interoperability with third-party systems or compatibility with other scenarios. If insecure algorithms are used, your data may be at risk. Do not enter sensitive information.
- Confirm the information and click OK.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.