TLS client mode: Authenticating server certificate

TLS server certificate validation occurs during the TLS handshake according to the following rules:

Users will be notified using Raslog/Auditlog with the reason for the TLS server certificate validation failure during TLS handshake, if applicable.

TLS cipher suites for client and server applications

The TLS cipher suites used by the client and server applications by the TOE are preset and cannot be changed through CLI commands. These supported cipher suites are as follows:

TLS_RSA_WITH_AES_128_CBC_SHA

TLS_RSA_WITH_AES_256_CBC_SHA

TLS_RSA_WITH_AES_128_CBC_SHA256

TLS_RSA_WITH_AES_256_CBC_SHA256

TLS_DHE_RSA_WITH_AES_128_CBC_SHA

TLS_DHE_RSA_WITH_AES_256_CBC_SHA

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

Verify the revocation status of certificate using OCSP

The switch will always perform OCSP revocation-check on the certificate when the authorityInfoAccess extension is present and indicates that the accessMethod to use OCSP (1.3.6.1.5.5.7.48.1) specifying the accessLocation, which is the URI of the OCSP responder. Only when the revocation staus is 'good' will the certificate be accepted.

When the switch cannot establish a connection to determine the validity of a certificate, then it will not accept the certificate. If the digital certificate does not have authorityInfoAccess extension with an OCSP URI, then no revocation check is performed on that certificate.