For best performance, prune the cipher and MAC algorithms in the server configuration file to only those that are supported by the cryptographic hardware. If a client suggests an algorithm that is not supported by the cryptographic hardware, software cryptography will be used.
Example: Ciphers and MACs in the server configuration file
Ciphers aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc MACs hmac-sha1,hmac-sha1-96
sshd2_config configuration file lists the algorithms that are used by default. For a list of all the supported algorithms, see the Administrator Manual.