Configurable SSH algorithms

The SSH implementation in the operating system of your device supports numerous cryptographic methods (algorithms). The devices can optionally restrict the choice of cryptographic methods to the algorithms of your preference.