Cipher choices listed in preferred order.

Use the "Add...", "Remove", "Move Up" and "Move Down" buttons to manage the list of cipher algorithms you desire. The order of the ciphers is important. FTP will attempt to use the top entry in the cipher list first. If it is not available or not supported by its session partner, FTP will attempt to use the next one in the list. Therefore, use the "Move Up" and "Move Down" buttons to ensure the ciphers are in priority order.

If you select multiple algorithms, FTP must exchange information with the session partner to determine which of the algorithms to use. This is based on:

Available cipher algorithms are:

  1. Triple DES encryption, SHA authentication
  2. RC4 (128-bit) encryption, SHA authentication
  3. RC4 (128-bit) encryption, MD5 authentication
  4. RC4 (40-bit) encryption, MD5 authentication
  5. RC2 (40-bit) encryption, MD5 authentication
  6. DES encryption, SHA authentication
  7. No encryption, SHA authentication
  8. No encryption, MD5 authentication