Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The default cipher suites are enabled in the following order:

  1. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

  2. TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

  3. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

  4. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

  5. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

  6. TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

  7. TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

  8. TLS_DHE_RSA_WITH_AES_128_CBC_SHA

  9. TLS_DHE_RSA_WITH_AES_256_CBC_SHA

  10. TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

  11. TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

  12. TLS_RSA_WITH_AES_128_GCM_SHA256

  13. TLS_RSA_WITH_AES_128_CBC_SHA

  14. TLS_RSA_WITH_AES_128_CBC_SHA256

  15. TLS_RSA_WITH_3DES_EDE_CBC_SHA

  16. TLS_RSA_WITH_AES_256_GCM_SHA384

  17. TLS_RSA_WITH_AES_256_CBC_SHA

  18. TLS_RSA_WITH_AES_256_CBC_SHA256

  19. TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256

  20. TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

  21. TLS_AES_256_GCM_SHA384

  22. TLS_CHACHA20_POLY1305_SHA256

  23. TLS_AES_128_GCM_SHA25

  24. TLS_AES_128_CCM_8_SHA256

  25. TLS_AES_128_CCM_SHA256

You can also enable the following cipher suites that are disabled by default:

  • TLS_DHE_DSS_WITH_AES_256_CBC_SHA

  • TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA

  • TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA

  • TLS_DHE_DSS_WITH_AES_128_CBC_SHA

  • TLS_RSA_WITH_RC4_128_SHA

  • TLS_DHE_DSS_WITH_AES_256_GCM_SHA384

  • TLS_DHE_DSS_WITH_AES_256_CBC_SHA256

  • TLS_DHE_DSS_WITH_AES_128_GCM_SHA256

  • TLS_DHE_DSS_WITH_AES_128_CBC_SHA256

You can use the show ssl_tls_ciphers command to view the enabled SSL/TLS cipher suites. For information, see show ssl_tls_ciphers.

...

Infoblox > set ssl_tls_ciphers enable TLS_RSA_WITH_RC4_128_SHA 89
TLS_RSA_WITH_RC4_128_SHA was enabled
The following services need to be restarted manually: GUI

...

Infoblox > set ssl_tls_ciphers disable 8
TLS_DHE_RSA_WITH_RC4AES_128_CBC_SHA was disabled

The following services need to be restarted manually: GUI

Note

Note

  • From NIOS 9.0.4:

    • Disabling the last cipher suite for an enabled TLS protocol is not allowed.

    • The set ssl_tls_ciphers CLI command cannot be used to enable/disable TLSv1.3 ciphers for SAML. By default, SAML service uses only the following three TLSv1.3 ciphers, if the TLSv1.3 protocol is enabled in NIOS.

      • TLS_AES_256_GCM_SHA384

      • TLS_CHACHA20_POLY1305_SHA256

      • TLS_AES_128_GCM_SHA256

    • Apache/SAML service is not affected by enabling/disabling the TLS cipher suites of a disabled TLS Protocol.

  • Starting from NIOS 9.0, the weak ciphers(RC4 and 3DES for APACHE) and (RC4 and 3DES, and DHE for SAML) are deprecated.

  • It is recommended to avoid enabling only the following ciphers, as this will affect the APACHE/SAML services.

    • RC4
      TLS_RSA_WITH_RC4_128_SHA

    • 3DES
      TLS_RSA_WITH_3DES_EDE_CBC_SHA
      TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA
      TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA

    • DHE
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
      TLS_DHE_DSS_WITH_AES_256_CBC_SHA
      TLS_DHE_DSS_WITH_AES_128_CBC_SHA
      TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
      TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
      TLS_DHE_DSS_WITH_AES_128_GCM_SHA256