Use this parameter to specify the first TLS Cipher Suite choice for this profile.
- Nosuite
- Rsa-with-aes-128-cbc-sha (default) – Confidentiality cipher and mode for the TLS Record protocol.
Rsa-with-aes-128-cbc-sha-256 – Confidentiality cipher and mode for the TLS Record protocol with SHA-256 as the hash function.
- Rsa-with-aes-256-cbc-sha – Confidentiality cipher and mode for the TLS Record protocol with AES 256 encryption.
Rsa-with-aes-256-cbc-sha-256* – Confidentiality cipher and mode for the TLS Record protocol with AES 256 encryption and SHA-256 as the hash function.
Rsa-with-null-sha – The integrity cipher used for the TLS Record protocol.
- Tls_ecdh_ecdsa_with_aes_256_cbc_sha384** – Confidentiality cipher and mode for TLS Record with AES256 GCM and SHA384 as hash function.
Tls_ecdh_ecdsa_with_aes_256_gcm_sha384** ** – Confidentiality cipher and mode for TLS Record with AES256 CBC and SHA384 as hash function.
Tls_ecdhe_rsa_with_aes_256_cbc_sha384* – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange).
- tls_ecdhe_rsa_with_aes_128_cbc_sha – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 CBC and SHA as hash function.
tls_ecdhe_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES128 GCM and SHA as the hash function.
tls-ecdhe-rsa-with-aes-256-gcm-sha-384* – Confidentiality cipher and mode for the TLS Record protocol using ECDHE (Elliptic Curve Diffie-Hellman key Exchange) with AES256 GCM and SHA384 as the hash function.
- tls_rsa_with_aes_128_gcm_sha256 – Confidentiality cipher and mode for the TLS Record protocol with AES 128 GCM encryption and SHA-256 as the hash function.
tls_rsa_with_aes_256_gcm_sha384 – Confidentiality cipher and mode for the TLS Record protocol with AES 256 GCM encryption and SHA-384 as the hash function.
- tls_aes_128_gcm_sha256*** – Confidentiality cipher and mode for the TLS Record with AES128 GCM and SHA256 as the hash function.
- tls_aes_256_gcm_sha384*** – Confidentiality cipher and mode for the TLS Record with AES256 GCM and SHA384 as the hash function.
- tls_chacha20_poly1305_sha256*** – Confidentiality cipher and mode for the TLS Record with ChaCha20-Poly1305 and SHA256
as the hash function.
* To use this cipher, TLS version 1.2 must be enabled in the TLS Profile.
** The SBC 11.1 and later versions do not support tls_ecdh_ecdsa_with_aes_256_cbc_sha384
. You must replace it with a valid Cipher before upgrading the SBC.
*** To use this cipher, TLS version 1.3 must be enabled in the TLS Profile.
**** To To use this cipher, TLS version 1.2 must be enabled in the TLS Profile and SSL certificates must be created using ECC keys.
NOTE: When Fips-140-3 mode mode is enabled, you cannot use the Rsa-with-null-sha should not be used.NOTE: TLS 1.3 does not support RSA. Certificates generated with RSA will not work with TLS 1.3.
Include Page |
---|
| _FIPS_Releases |
---|
| _FIPS_Releases |
---|
|