Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Panel

In this section:

Table of Contents
maxLevel2

Multiexcerpt include
MultiExcerptNameDTLS Crypto Suites
PageWithExcerptTLS for Signaling

To View Dtls Profile

On SBC main screen, go to All > Profiles > Security > Dtls Profile.

The Dtls Profile window is displayed.

Caption
0Figure
1Security - Dtls Profile
 

To Edit Dtls Profile

To edit any of the Dtls Profile in the list, click the radio button next to the specific Dtls Profile name.

Caption
0Figure
1Security - Dtls Profile Highlighted
 

The Edit Selected Dtls Profile window is displayed below.

Caption
0Figure
1Security - Dtls Profile Edit
 

Make the required changes and click Save at the right hand bottom of the panel to save the changes made.

To Create Dtls Profile

To create a new Dtls Profile, click New Dtls Profile tab on the Dtls Profile List panel.

Caption
0Figure
1Security - Dtls Profile Fields
 

The Create New Dtls Profile window is displayed.

Caption
0Figure
1Security - Dtls Profile Create
 

The following fields are displayed:

Caption
0Table
1Dtls Profile Parameters
 

Parameter

Description

NameSpecifies the name of the Dtls Profile created. The value ranges up to 23 characters.

Handshake Timer

Specifies the time in which the Dtls handshake must be completed. The timer starts when the TCP connection is established. Must be 1 - 60 seconds; default is 5.
Session Resump TimerSpecifies the Dtls session resumption period for which cached sessions are retained (in seconds). Dtls allows successive connections to be created within one Dtls session and the resumption of a session after a Dtls connection is closed or after a server card failover, without repeating the entire authentication and other setup steps for each connection, except when the space must be reclaimed for a new session. Must be 0 - 86,400 seconds; default is 300.
Cipher Suite1

Use this parameter to specify the first Dtls Cipher Suite choice for this profile.

  • nosuite
  • rsa-with-3des-ede-cbc-sha – Authentication mechanism in the Dtls Handshake protocol.
  • rsa-with-aes-128-cbc-sha (default)  Confidentiality cipher and mode for the Dtls Record protocol.
  • rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the Dtls Record protocol with SHA-256 as the hash function.

  • rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the Dtls Record protocol with AES 256 encryption.  
  • rsa-with-aes-256-cbc-sha-256* Confidentiality cipher and mode for the Dtls Record protocol with AES 256 encryption and SHA-256 as the hash function.

  • rsa-with-null-sha – The integrity cipher used for the Dtls Record protocol. 

  • tls_ecdh_ecdsa_with_aes_256_cbc_sha384** – Confidentiality cipher and mode for Dtls Record with AES256 GCM and SHA384 as hash function.
  • tls_ecdh_ecdsa_with_aes_256_gcm_sha384** – Confidentiality cipher and mode for Dtls Record with AES256 CBC and SHA384 as hash function.

  • tls_ecdhe_rsa_with_aes_256_cbc_sha384* Confidentiality cipher and mode for the Dtls Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).

  • tls_ecdhe_rsa_with_aes_128_cbc_sha  Confidentiality cipher and mode for the Dtls Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function.

* To use this cipher, Dtls version 1.2 must be enabled in the Dtls Profile.

** To use this cipher, Dtls version 1.2 must be enabled in the Dtls Profile and SSL certificates must be created using ECC keys.

Warning: When fips-140-2 mode is enabled, rsa-with-null-sha should not be used.

Cipher Suite2

Use this parameter to specify the second Dtls Cipher Suite choice for this profile.

  • nosuite (default)
  • rsa-with-3des-ede-cbc-sha – Authentication mechanism in the Dtls Handshake protocol.
  • rsa-with-aes-128-cbc-sha (default)  Confidentiality cipher and mode for the Dtls Record protocol.
  • rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the Dtls Record protocol with SHA-256 as the hash function.

  • rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the Dtls Record protocol with AES 256 encryption.  
  • rsa-with-aes-256-cbc-sha-256* Confidentiality cipher and mode for the Dtls Record protocol with AES 256 encryption and SHA-256 as the hash function.

  • rsa-with-null-sha – The integrity cipher used for the Dtls Record protocol. 

  • tls_ecdh_ecdsa_with_aes_256_cbc_sha384** – Confidentiality cipher and mode for Dtls Record with AES256 GCM and SHA384 as hash function.
  • tls_ecdh_ecdsa_with_aes_256_gcm_sha384** – Confidentiality cipher and mode for Dtls Record with AES256 CBC and SHA384 as hash function.

  • tls_ecdhe_rsa_with_aes_256_cbc_sha384* Confidentiality cipher and mode for the Dtls Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).

  • tls_ecdhe_rsa_with_aes_128_cbc_sha  – Confidentiality cipher and mode for the Dtls Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function.

* To use this cipher, Dtls version 1.2 must be enabled in the Dtls Profile.

** To use this cipher, Dtls version 1.2 must be enabled in the Dtls Profile and SSL certificates must be created using ECC keys.

Warning: When fips-140-2 mode is enabled, rsa-with-null-sha should not be used.

Cipher Suite3 

Use this parameter to specify the third Dtls Cipher Suite choice for this profile.

  • nosuite (default)
  • rsa-with-3des-ede-cbc-sha – Authentication mechanism in the Dtls Handshake protocol.
  • rsa-with-aes-128-cbc-sha (default)  Confidentiality cipher and mode for the Dtls Record protocol.
  • rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the Dtls Record protocol with SHA-256 as the hash function.

  • rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the Dtls Record protocol with AES 256 encryption.  
  • rsa-with-aes-256-cbc-sha-256* Confidentiality cipher and mode for the Dtls Record protocol with AES 256 encryption and SHA-256 as the hash function.

  • rsa-with-null-sha – The integrity cipher used for the Dtls Record protocol. 

  • tls_ecdh_ecdsa_with_aes_256_cbc_sha384** – Confidentiality cipher and mode for Dtls Record with AES256 GCM and SHA384 as hash function.
  • tls_ecdh_ecdsa_with_aes_256_gcm_sha384** – Confidentiality cipher and mode for Dtls Record with AES256 CBC and SHA384 as hash function.

  • tls_ecdhe_rsa_with_aes_256_cbc_sha384* Confidentiality cipher and mode for the Dtls Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).

  • tls_ecdhe_rsa_with_aes_128_cbc_sha  Confidentiality cipher and mode for the Dtls Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function.

* To use this cipher, Dtls version 1.2 must be enabled in the Dtls Profile.

** To use this cipher, Dtls version 1.2 must be enabled in the Dtls Profile and SSL certificates must be created using ECC keys.

Warning: When fips-140-2 mode is enabled, rsa-with-null-sha should not be used.

 

Dtls Role

 Specifies the allowed DTLS roles of this DTLS profile. The options are:

  • Client
  • Server (default)
Hash Type

 Specifies the allowed DTLS hash function for a specified DTLS profile. The options are:

  • Md2
  • Md5
  • Sha1 (default)
  • Sha224
  • Sha256
  • Sha384
  • Sha512
Cert NameSpecifies the name of the certificate referred by a specified DTLS profile. The default value is defaultDtlsSBCCert.
Cookie Exchange

Specifies the state that is, enabled or disabled cookie exchange.

  • disabled
  • enabled (default)
V1_0

Dtls protocol version 1.0.

  • disabled
  • enabled (default)
V1_1

Dtls protocol version 1.1.

  • disabled  (default)
  • enabled
 
V1_2

Dtls protocol version 1.2.

  • disabled (default)
  • enabled

To Copy Dtls Profile

To copy any of the created Dtls Profile and to make any minor changes, click the radio button next to the specific Dtls Profile to highlight the row.

Caption
0Figure
1Security - Dtls Profile Highlighted
 

Click Copy Dtls Profile tab on the Dtls Profile List panel.

Caption
0Figure
1Security - Dtls Profile Fields
 

The Copy Selected Dtls Profile window is displayed along with the field details which can be edited.

Caption
0Figure
1Security - Dtls Profile Copy
 

Make the required changes to the required fields and click Save to save the changes. The copied Dtls Profile is displayed at the bottom of the original Dtls Profile in the Dtls Profile List panel.

To Delete Dtls Profile

To delete any of the created Dtls Profile, click the radio button next to the specific Dtls Profile which you want to delete.

Caption
0Figure
1Security - Dtls Profile Highlighted
 

Click Delete at the end of the highlighted row. A delete confirmation message appears seeking your decision.

Caption
0Figure
1Security - Dtls Profile Delete Confirmation
 

Click Yes to remove the specific Dtls Profile from the list.