SSL policies can be used to protect transmitted data from being tampered with, improving security.
Some traditional protocols, such as syslog, do not have security mechanisms. They transmit data in clear text, cannot authenticate communicating devices or prevent transmitted data from being tampered with, exposing data transmission to security risks. SSL provides data encryption, identity authentication, and message integrity check o ensure the security of TCP-based application layer protocols.
Deploy an SSL policy in the SSL policy view:
The system view is displayed.
An SSL policy is configured, and the SSL policy view is displayed.
Elliptic curve parameters are configured for the ECDHE algorithm.
The minimum version is configured for the SSL policy.
After a device configured with TLS 1.0 is upgraded to a version that does not support configuration of TLS 1.0, the minimum version supported by the SSL policy is still TLS 1.0. You can run the ssl minimum version { tls1.1 | tls1.2 | tls1.3 } command to reconfigure the minimum version for the SSL policy. This process is irreversible.
After a device which is not configured with the ssl minimum version command is upgraded to the current version, the minimum version supported by the SSL policy is TLS 1.1. The default minimum version is TLS 1.2. You can run the ssl minimum version { tls1.1 | tls1.2 | tls1.3 } command to reconfigure the minimum version for the SSL policy.
Certificate verification is enabled.
The minimum path length of the digital certificate chain is configured.
A signature algorithm is configured for SSL handshake.
After the upgrade, fewer signature algorithms are supported by default. As a result, SSL handshake may fail due to signature algorithm mismatch. To prevent this problem, you can run this command to adjust the supported signature algorithms.
A PKI domain is bound to the SSL policy.
A digital certificate is loaded. Currently, the PEM and PFX certificates and the PEM certificate chain are supported. Load a digital certificate or certificate chain as needed.
Loading a digital certificate is optional for a device but mandatory for an NMS.
A digital CRI is loaded.
A maximum of two CRL files can be loaded to an SSL policy.
A trusted-CA file is loaded. A maximum of four trusted-CA files can be loaded for an SSL policy.
A cipher suite is bound to the SSL policy. Before binding a cipher suite to an SSL policy, ensure that the cipher suite has been configured for the SSL policy. For details, see Configuring an SSL Cipher Suite.
The RSA key exchange algorithm is excluded from the SSL policy cipher suite.
The RSA key exchange algorithm is not recommended on networks that have high security requirements because this algorithm is not secure.
CBC encryption algorithms are excluded from the SSL policy cipher suite.
The CBC encryption algorithm is not recommended for networks that have high security requirements because this algorithm is not secure.
The SHA1 digest algorithm is excluded from the SSL cipher suite.
The SHA1 digest algorithm is not recommended for networks that have high security requirements because this algorithm is not secure.
The modulus of the Diffie-Hellman key exchange algorithm is configured.
After the upgrade, the default modulus length of the Diffie-Hellman key exchange algorithm increases. As a result, SSL handshake may fail if the modulus length is too long. To prevent this problem, you can run this command to adjust the modulus length.
Return to the system view.
The certificate expiration alarm threshold and check interval are configured.
Run the remote-backup-service service-name command to enter the RBS view.
Run the bind ssl-policy ssl-policy-name command to bind an SSL policy.
In VS mode, this command is supported only by the admin VS.
For detailed dual-device backup service configurations, see Establishing a Dual-Device Backup Platform.
Run the dcn command to enter the DCN view.
Run the bind ssl-policy ssl-policy-name command to bind an SSL policy.
For detailed DCN service configurations, see Configuring SSL Authentication on a GNE.
The configuration is committed.
The system view is displayed.
An SSL policy is configured, and the DTLS policy view is displayed.
Certificate verification is enabled.
The minimum path length of the digital certificate chain is configured.
A PKI domain is bound to the SSL policy.
After a PKI domain is bound to an SSL policy, the SSL policy uses the certificates and CRL in the PKI domain.
The configuration is committed.