Configure TLS Ciphers

Contents


1   Description

This instruction describes how to configure a system-wide Transport Layer Security (TLS) cipher setting for all TLS-based protocols.

1.1   Cipher Filter String Format

The value of attribute cipherFilter consists of one or more cipher filters separated by colons, each cipher filter can be any value of the members contained by a Cipher struct, as follows:

The filter string can be prefixed by one of following marks:

The cipher filters must contain at least one positive expression, that is, without character '!' or '-' in the cipher string, otherwise the filter results in an empty cipher suite list.

The filter can also be configured as following two special strings:

2   Procedure

2.1   Configure TLS Ciphers

Steps

  1. Navigate to Tls managed object, for example:

    >dn ManagedElement=NODE06ST,SystemFunctions=1,SecM=1,Tls=1

  2. Enter Config mode:

    (Tls=1)>configure

  3. Set the cipherFilter to configure proper cipher suites, for example:

    (config-Tls=1)>cipherFilter="PSK-AES256-CBC-SHA:DES-CBC3-SHA"

    The cipher filter string must follow the constraints stated in datatype CipherList under Tls.

  4. Commit the settings:

    (config-Tls=1)>commit

  5. Verify the cipherFilter:

    (Tls=1)>show cipherFilter

    The following is an example output:

    cipherFilter="PSK-AES256-CBC-SHA:DES-CBC3-SHA"
  6. Verify that the enabledCiphers has been updated accordingly. The value of attribute enabledCiphers is automatically sorted by strength of cipher suites, strongest first:

    (Tls=1)>show enabledCiphers

    The following is an example output:

    enabledCiphers="PSK-AES256-CBC-SHA"
       authentication="aPSK"
       encryption="AES"
       export=""
       keyExchange="kPSK"
       mac="SHA1"
       protocolVersion="SSLv3"
    enabledCiphers="DES-CBC3-SHA"
       authentication="aRSA"
       encryption="3DES"
       export=""
       keyExchange="kRSA"
       mac="SHA1"
       protocolVersion="SSLv3"