Configuring the use of secure cryptographic algorithms, ciphers, and protocols

To ensure the security of network connections between the Integration Server and the virtual infrastructure, it is recommended to use the following cryptographic algorithms, cipher suites, and protocols on devices where the Integration Server and the virtual infrastructure objects to which the Integration Server connects are installed:

If you do not have the latest versions of operating systems and hypervisors installed, problems may occur in the Integration Server's interactions with the virtual infrastructure due to incompatible cipher suites. In this case, we recommend to contact Technical Support.

Page top