basicConstraints
extension and that the CA flag is set to TRUE for all CA certificates.
extendedKeyUsage
field should be validated according to the following rules:
extendedKeyUsage
field.
extendedKeyUsage
field.
extendedKeyUsage
field.
extendedKeyUsage
field.
basicConstraints
extension is present and the CA flag is set to TRUE.
Users will be notified using Raslog/Auditlog with the reason for the TLS server certificate validation failure during TLS handshake, if applicable.
The TLS cipher suites used by the client and server applications by the TOE are preset and cannot be changed through CLI commands. These supported cipher suites are as follows:
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
The switch will always perform OCSP revocation-check on the certificate when the authorityInfoAccess
extension is present and indicates that the accessMethod
to use OCSP
(1.3.6.1.5.5.7.48.1) specifying the accessLocation
, which is
the URI of the OCSP responder. Only when the revocation staus is 'good' will the
certificate be accepted.
When the switch cannot establish a connection to determine the validity of a certificate, then it will not accept the certificate. If the digital certificate does not have authorityInfoAccess extension with an OCSP URI, then no revocation check is performed on that certificate.