D-Link DGS-1250 Emulator - Page 432

DGS-1250 Series Gigabit Ethernet Smart Managed Switch CLI Reference Guide, CIPHERSUITE, TRUSTPOINT,

Page 432 highlights

DGS-1250 Series Gigabit Ethernet Smart Managed Switch CLI Reference Guide ciphersuite CIPHERSUITE secure-trustpoint TRUSTPOINT session-cache-timeout TIME-OUT  tls1.2 - Specifies to use TLS version 1.2 as the SSL service policy. (Optional) Specifies the cipher suites that should be used by the secure service when negotiating a connection with a remote peer. When the cipher suite is not configured, the SSL client and server will negotiate the best cipher suite that they both support from the list of available cipher suites. Multiple cipher suites can be specified to be used. Use the no form of this command to disable the selected cipher suites. The following keywords can be used:  dhe-dss-3des-ede-cbc-sha - Specifies to use DH key exchange with 3DESEDE-CBC encryption and SHA for message digest.  rsa-3des-ede-cbc-sha - Specifies to use RSA key exchange with 3DES and DES-EDE3-CBC for message encryption and the Secure Hash Algorithm (SHA) for message digest.  rsa-rc4-128-sha - Specifies to use RSA key exchange with RC4 128-bit encryption for message encryption and SHA for message digest.  rsa-rc4-128-md5 - Specifies to use RSA key exchange with RC4 128-bit encryption for message encryption and Message Digest 5 (MD5) for message digest.  rsa-export-rc4-40-md5 - Specifies to use RSA EXPORT key exchange with RC4 40 bits for message encryption and MD5 for message digest.  rsa-aes-128-cbc-sha - Specifies to use RSA key exchange with AES 128-bit encryption for message encryption and SHA for message digest.  rsa-aes-256-cbc-sha - Specifies to use RSA key exchange with AES 256-bit encryption for message encryption and SHA for message digest.  rsa-aes-128-cbc-sha256 - Specifies to use RSA key exchange with AES 128-bit encryption for message encryption and SHA 256-bit for message digest.  rsa-aes-256-cbc-sha256 - Specifies to use RSA key exchange with AES 256-bit encryption for message encryption and SHA 256-bit for message digest.  dhe-dss-aes-256-cbc-sha - Specifies to use DH key exchange with AES 256-bit encryption and SHA for message digest.  dhe-rsa-aes-256-cbc-sha - Specifies to use DH key exchange with AES 256-bit encryption and SHA for message digest. (Optional) Specifies the name of the trust-point that should be used in SSL handshake. When this parameter is not specified, the trust-point which is specified as the primary will be used. If no primary trust-point is specified, the built-in certificate/key pairs will be used. In no form of this command, the specified trust-point will be canceled and then the built-in certificate/key pairs will be used. (Optional) Specifies the timeout value in seconds for the information stored in the SSL session cache. The valid range is from 60 to 86400. When this parameter is not configured, the default session cache timeout is 600 seconds. In the no form of this command, the SSL session cache timeout will be reverted to the default value. Default None. Command Mode Global Configuration Mode. Usage Guideline Use this command to configure the SSL service policy. 429

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559

DGS-1250 Series Gigabit Ethernet Smart Managed Switch CLI Reference Guide
429
tls1.2
- Specifies to use TLS version 1.2 as the SSL service policy.
ciphersuite
CIPHERSUITE
(Optional) Specifies the cipher suites that should be used by the secure service
when negotiating a connection with a remote peer. When the cipher suite is not
configured, the SSL client and server will negotiate the best cipher suite that they
both support from the list of available cipher suites. Multiple cipher suites can be
specified to be used. Use the no form of this command to disable the selected
cipher suites.
The following keywords can be used:
dhe-dss-3des-ede-cbc-sha
- Specifies to use DH key exchange with 3DES-
EDE-CBC encryption and SHA for message digest.
rsa-3des-ede-cbc-sha
- Specifies to use RSA key exchange with 3DES and
DES-EDE3-CBC for message encryption and the Secure Hash Algorithm
(SHA) for message digest.
rsa-rc4-128-sha
- Specifies to use RSA key exchange with RC4 128-bit
encryption for message encryption and SHA for message digest.
rsa-rc4-128-md5
- Specifies to use RSA key exchange with RC4 128-bit
encryption for message encryption and Message Digest 5 (MD5) for
message digest.
rsa-export-rc4-40-md5
- Specifies to use RSA EXPORT key exchange with
RC4 40 bits for message encryption and MD5 for message digest.
rsa-aes-128-cbc-sha
- Specifies to use RSA key exchange with AES 128-bit
encryption for message encryption and SHA for message digest.
rsa-aes-256-cbc-sha
- Specifies to use RSA key exchange with AES 256-bit
encryption for message encryption and SHA for message digest.
rsa-aes-128-cbc-sha256
- Specifies to use RSA key exchange with AES
128-bit encryption for message encryption and SHA 256-bit for message
digest.
rsa-aes-256-cbc-sha256
- Specifies to use RSA key exchange with AES
256-bit encryption for message encryption and SHA 256-bit for message
digest.
dhe-dss-aes-256-cbc-sha
- Specifies to use DH key exchange with AES
256-bit encryption and SHA for message digest.
dhe-rsa-aes-256-cbc-sha
- Specifies to use DH key exchange with AES
256-bit encryption and SHA for message digest.
secure-trustpoint
TRUSTPOINT
(Optional) Specifies the name of the trust-point that should be used in SSL
handshake. When this parameter is not specified, the trust-point which is
specified as the primary will be used. If no primary trust-point is specified, the
built-in certificate/key pairs will be used. In no form of this command, the
specified trust-point will be canceled and then the built-in certificate/key pairs will
be used.
session-cache-timeout
TIME-OUT
(Optional) Specifies the timeout value in seconds for the information stored in the
SSL session cache. The valid range is from 60 to 86400. When this parameter is
not configured, the default session cache timeout is 600 seconds. In the no form
of this command, the SSL session cache timeout will be reverted to the default
value.
Default
None.
Command Mode
Global Configuration Mode.
Usage Guideline
Use this command to configure the SSL service policy.