Updated on 2025-08-06 GMT+08:00

Configuring Insecure Algorithms

You can enable and disable insecure algorithms as needed.

Procedure

  1. Log in to your bastion host.
  2. Choose System > System Config > Security.
  3. On the right of the Algorithm Config area, click Edit. In the displayed dialog box, enable this function.

    After this function is enabled, SSH allows the use of insecure algorithms for interoperability with third-party systems or compatibility with other scenarios. If insecure algorithms are used, your data may be at risk. Do not enter sensitive information.

  4. Confirm the information and click OK.