Use this parameter to specify the first TLS Cipher Suite choice for this profile.
- Nosuite
- Rsa-with-aes-128-cbc-sha (default) – Confidentiality cipher and mode for the TLS Record protocol.
Rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the TLS Record protocol with SHA-256 as the hash function.
- Rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the TLS Record protocol with AES 256 encryption.
Rsa-with-aes-256-cbc-sha-256* – Confidentiality cipher and mode for the TLS Record protocol with AES 256 encryption and SHA-256 as the hash function.
Rsa-with-null-sha – The integrity cipher used for the TLS Record protocol.
- Tls_ecdh_ecdsa_with_aes_256_cbc_sha384** – Confidentiality cipher and mode for TLS Record with AES256 GCM and SHA384 as hash function.
Tls_ecdh_ecdsa_with_aes_256_gcm_sha384**** – Confidentiality cipher and mode for TLS Record with AES256 CBC and SHA384 as hash function.
Tls_ecdhe_rsa_with_aes_256_cbc_sha384* – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).
- tls_ecdhe_rsa_with_aes_128_cbc_sha – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function.
tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function.
tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function.
- tls_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the TLS Record protocol with AES 128 GCM encryption and SHA-256 as the hash function.
tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the TLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function.
- tls_aes_128_gcm_sha256*** – Confidentiality cipher and mode for the TLS Record with AES128 GCM and SHA256 as the hash function.
- tls_aes_256_gcm_sha384*** – Confidentiality cipher and mode for the TLS Record with AES256 GCM and SHA384 as the hash function.
- tls_chacha20_poly1305_sha256*** – Confidentiality cipher and mode for the TLS Record with ChaCha20-Poly1305 and SHA256 as the hash function.
* To use this cipher, TLS version 1.2 must be enabled in the TLS Profile.
** To use this cipher, TLS version 1.2 must be enabled in the TLS Profile and SSL certificates must be created using ECC keysThe SBC 11.1 and later versions do not support tls_ecdh_ecdsa_with_aes_256_cbc_sha384
. You must replace it with a valid Cipher before upgrading the SBC.
*** To use this cipher, TLS version 1.3 must be enabled in the TLS Profile.
**** To use this cipher, TLS version 1.2 must be enabled in the TLS Profile and SSL certificates must be created using ECC keys.
NOTE: When Fips-140-NOTE: When Fips-140-2 mode is enabled, Rsa-with-null-sha should not be used.
NOTE: TLS 1.3 does not support RSA. Certificates generated with RSA will not work with TLS 1.3.
Include Page |
---|
| _FIPS_Releases |
---|
| _FIPS_Releases |
---|
|