Hi Experts, This time for your advice on below point..1) Recently we were having a vulnerability assessment testing(through a tool) on network and observation are :-"SSH Weak MAC Algorithms Enabled,SSH is configured to allow MD5 and 96-bit MAC algor...