Submit a ticketCall us

WebinarVisual Monitoring Tactics: Getting More Log Search Value from SolarWinds Log & Event Manager with nDepth Webcast

Do things seem to make more sense when they are visualized? Are you an IT professional or security expert with a wish for more cybersecurity tools that provide an intuitive visual experience? Join Alexis Horn and Jamie Hynds from SolarWinds as they demonstrate how the nDepth feature in LEM can help make visualizing log search results a reality.

Register now.

Home > Success Center > Network Configuration Manager (NCM) > NCM - Knowledgebase Articles > NCM supported encryption protocols for SSH

NCM supported encryption protocols for SSH

Table of contents
Created by Interspire Import, last modified by MindTouch on Jun 23, 2016

Views: 2,209 Votes: 5 Revisions: 10

Overview

This article provides information on encryption protocols for SSH supported by NCM.

Environment

All NCM versions

Detail

NCM supports the following encryption protocols for SSH:

  • DES
  • 3DES (TripleDES)
  • AES
  • BLOWFISH
  • AES128
  • AES192
  • AES256
  • CAST128


While negotiating connection with device that NCM is attempting to use encryption algorithms for: 

  • SSH1

    NCM tries to negotiate the TripleDES algorithm first. If that fails, NCM tries Blowfish. If Blowfish is not available (on the remote server), NCM  falls-back to DES.
     
  • SSH2

    NCM tries to negotiate an AES algorithm first (any type). If that fails, NCM tries TripleDES. If TripleDES is not available, NCM tries Blowfish. If Blowfish fails, NCM drops the connection instead of trying DES, which most (new) servers don't support because of its poor security.
Last modified

Tags

Classifications

Public