Setting Supported TLS Version

To force the SLX device to use a specific version of TLS or higher, you must configure the minimum supported TLS version for both the Server and Client operating modes.

  1. Navigate into the Configuration Terminal mode.
    SLX # config term
    Entering configuration mode terminal
    
    SLX (config)#
                        
  2. Navigate into the management-security mode.
    SLX (config)# management-security ?
    Possible completions:
      <cr>
    
    SLX (config)# management-security
    SLX (mgmt-security)# 
  3. The Management Security mode enables you to configure the minimum supported TLS version for both Server and Client modes of operation of the SLX device. This step shows how to configure the Client mode of operation.
     SLX (mgmt-security)# 
    SLX (mgmt-security)# ssl-profile ?
    Possible completions:
       client    management security ssl profile client for tls configuration
       server    management security ssl profile server for tls configuration
    
    SLX (mgmt-security)# ssl-profile client
    SLX (mgmt-sec-ssl-profile-client)# 
                        
  4. Use the tls min-version command to set the minimum version for this mode of operation. The supported parameters for this command are 1.1 and 1.2.
     SLX (mgmt-sec-ssl-profile-client)# tls ?
    Possible completions:
        min-version min version to be supported by client
    
    SLX(mgmt-sec-ssl-profile-client)# tls min-version ?
    Possible completions:
        <1.1|1.2> specify TLS version
    
    SLX(mgmt-sec-ssl-profile-client)# tls min-version 1.2
                        

Once configured, it enables SLX to control how it connects to a remote server (when it is a client) and how remote clients can connect to it (when it is a server).

When connecting to a remote server as a client, and a minimum supported TLS version is configured in the ssl-profile client mode, then if the remote servers supported version is lower than the one configured in this SLX device, then the device will break handshake after receiving the server hello.

When a remote client device is attempting to connect to this SLX device, and a minimum supported TLS version is configured in the ssl-profile server mode, then if the highest version supported by the client (as sent in the client hello message) is lower than the configured minimum supported version, the SLX device (acting as the server) will break the handshake without sending a server hello.

Example

The following example shows the complete configuration for setting the minimum supported TLS version for the SLX device as a client.

SLX # config term
Entering configuration mode terminal

SLX (config)# 
SLX (config)# management-security
SLX (mgmt-security)#
SLX(mgmt-security)# ssl-profile ?
Possible completions:
    client management security ssl profile client for tls configuration
    server management security ssl profile server for tls configuration

SLX (mgmt-security)# ssl-profile client
SLX (mgmt-sec-ssl-profile-client)# 
SLX (mgmt-sec-ssl-profile-client)# tls ?
Possible completions:
    min-version min version to be supported by client

SLX(mgmt-sec-ssl-profile-client)# tls min-version ?
Possible completions:
    <1.1|1.2> specify TLS version

SLX(mgmt-sec-ssl-profile-client)# tls min-version 1.2
            

The following example shows the complete configuration for setting the minimum supported TLS version for the SLX device as a server.

SLX # config term
Entering configuration mode terminal

SLX (config)# 
SLX (config)# management-security
SLX (mgmt-security)#
SLX(mgmt-security)# ssl-profile ?
Possible completions:
    client management security ssl profile client for tls configuration
    server management security ssl profile server for tls configuration

SLX (mgmt-security)# ssl-profile server 
SLX (mgmt-sec-ssl-profile-server)# 
SLX (mgmt-sec-ssl-profile-server)# tls ?
Possible completions:
    min-version min version to be supported by server

SLX(mgmt-sec-ssl-profile-server)# tls min-version ?
Possible completions:
    <1.1|1.2> specify TLS version

SLX(mgmt-sec-ssl-profile-server)# tls min-version 1.2