SLX uses OpenSSL to provide transport layer security and the current version of OpenSSL supports TLS v 1.1 to TLS v 1.2. Since the SLX box can be considered as both a client as well as a server, you can apply different supported TLS versions for each of these types. The ssl-profile command within the management-security mode allows you to configure these values.
To force the SLX device to use a specific version of TLS or higher, you must configure the minimum supported TLS version for both the Server and Client operating modes.
SLX # config term
Entering configuration mode terminal
SLX (config)#
SLX (config)# management-security ? Possible completions: <cr> SLX (config)# management-security SLX (mgmt-security)#
SLX (mgmt-security)#
SLX (mgmt-security)# ssl-profile ?
Possible completions:
client management security ssl profile client for tls configuration
server management security ssl profile server for tls configuration
SLX (mgmt-security)# ssl-profile client
SLX (mgmt-sec-ssl-profile-client)#
SLX (mgmt-sec-ssl-profile-client)# tls ?
Possible completions:
min-version min version to be supported by client
SLX(mgmt-sec-ssl-profile-client)# tls min-version ?
Possible completions:
<1.1|1.2> specify TLS version
SLX(mgmt-sec-ssl-profile-client)# tls min-version 1.2
Once configured, it enables SLX to control how it connects to a remote server (when it is a client) and how remote clients can connect to it (when it is a server).
When connecting to a remote server as a client, and a minimum supported TLS version is configured in the ssl-profile client mode, then if the remote servers supported version is lower than the one configured in this SLX device, then the device will break handshake after receiving the server hello.
When a remote client device is attempting to connect to this SLX device, and a minimum supported TLS version is configured in the ssl-profile server mode, then if the highest version supported by the client (as sent in the client hello message) is lower than the configured minimum supported version, the SLX device (acting as the server) will break the handshake without sending a server hello.
The following example shows the complete configuration for setting the minimum supported TLS version for the SLX device as a client.
SLX # config term
Entering configuration mode terminal
SLX (config)#
SLX (config)# management-security
SLX (mgmt-security)#
SLX(mgmt-security)# ssl-profile ?
Possible completions:
client management security ssl profile client for tls configuration
server management security ssl profile server for tls configuration
SLX (mgmt-security)# ssl-profile client
SLX (mgmt-sec-ssl-profile-client)#
SLX (mgmt-sec-ssl-profile-client)# tls ?
Possible completions:
min-version min version to be supported by client
SLX(mgmt-sec-ssl-profile-client)# tls min-version ?
Possible completions:
<1.1|1.2> specify TLS version
SLX(mgmt-sec-ssl-profile-client)# tls min-version 1.2
The following example shows the complete configuration for setting the minimum supported TLS version for the SLX device as a server.
SLX # config term
Entering configuration mode terminal
SLX (config)#
SLX (config)# management-security
SLX (mgmt-security)#
SLX(mgmt-security)# ssl-profile ?
Possible completions:
client management security ssl profile client for tls configuration
server management security ssl profile server for tls configuration
SLX (mgmt-security)# ssl-profile server
SLX (mgmt-sec-ssl-profile-server)#
SLX (mgmt-sec-ssl-profile-server)# tls ?
Possible completions:
min-version min version to be supported by server
SLX(mgmt-sec-ssl-profile-server)# tls min-version ?
Possible completions:
<1.1|1.2> specify TLS version
SLX(mgmt-sec-ssl-profile-server)# tls min-version 1.2