| At line 1 changed 20 lines | 
| A [https://www.sftp.net/servers|RFC] compliant pure __SFTP/SCP__ server implementation. SSH [Tunneling|tunnels] is supported in CrushFTP. An SSH shell is __not allowed__ as its often the method used in exploits.  A shell has no purpose in file transfer. | 
|  | 
| [Public / Private| UserManagerRestrictionsSSH] key authentication is supported too.  The ciphers can be customized to prevent wasted CPU usage from inefficient ciphers. | 
|  | 
| By default, there is an Idle Timeout set to 300 sec (5 min). Go to the SSH tab in the IP/Servers to change. In order for this change to take effect, you must restart the server for the IP. | 
| %%tabbedSection | 
| %%tab-tabTitle1 | 
| tab content 1 | 
| /% | 
| %%tab-tabTitle2 | 
| tab content 2 | 
| /% | 
| %%tab-tabTitle3 | 
| tab content 3 | 
| /% | 
| /% | 
|  | 
| [{Image src='img.jpg' width='..' height='..' align='left|center|right' style='..' class='..' }] | 
|  | 
| [attachments|sftp_ssh.png] | 
| A [RFC|https://www.sftp.net/servers] compliant pure __SFTP/SCP__ server implementation. SSH [Tunneling|tunnels] is supported in CrushFTP. An SSH shell is __not allowed__ as its often the method used in exploits.  A shell has no purpose in file transfer.\\ | 
| At line 3 added 8 lines | 
| [Public / Private| UserManagerRestrictionsSSH] key authentication is supported too.  The ciphers can be customized to prevent wasted CPU usage from inefficient ciphers.\\ | 
| \\ | 
| By default, there is an SFTP server listener configured with __compatible defaults__ bound to port __2222__ readily available on first deploy.\\ | 
| \\ | 
| \\ | 
| \\ | 
| [{Image src='sftp_ssh2.jpg' width='1140' height='..' align='left' style='..' class='..' }]\\ | 
| \\ | 
| At line 24 changed one line | 
| aes128-ctr,aes192-ctr,aes256-ctr,3des-ctr,3des-cbc,blowfish-cbc,arcfour,arcfour128,arcfour256,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com | 
| aes128-ctr,aes192-ctr,aes256-ctr,3des-ctr,3des-cbc,blowfish-cbc,arcfour,arcfour128,arcfour256,aes128-gcm@openssh.com,aes256-gcm@openssh.com | 
| At line 26 changed one line | 
| ''aes128-cbc,aes192-cbc,aes256-cbc are also supported but not recommended due to their known insecurity.''\\ | 
| ''aes128-cbc,aes192-cbc,aes256-cbc,chacha20-poly1305@openssh.com are also supported but not recommended due to their known insecurity.''\\ |