InlineLBServerSslProfile1
Properties
It is a label of cipher group which is mostly consumed by GUI.
Possible values are: BALANCED , HIGH_SECURITY , HIGH_COMPATIBILITY , CUSTOM
Supported SSL cipher list to client side.
Possible values are: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 , TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 , TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA , TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA , TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA , TLS_ECDH_RSA_WITH_AES_256_CBC_SHA , TLS_RSA_WITH_AES_256_CBC_SHA , TLS_RSA_WITH_AES_128_CBC_SHA , TLS_RSA_WITH_3DES_EDE_CBC_SHA , TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA , TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 , TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 , TLS_RSA_WITH_AES_128_CBC_SHA256 , TLS_RSA_WITH_AES_128_GCM_SHA256 , TLS_RSA_WITH_AES_256_CBC_SHA256 , TLS_RSA_WITH_AES_256_GCM_SHA384 , TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA , TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 , TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 , TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 , TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA , TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 , TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 , TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 , TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 , TLS_ECDH_RSA_WITH_AES_128_CBC_SHA , TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 , TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 , TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 , TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
This flag is set to true when all the ciphers and protocols are FIPS compliant. It is set to false when one of the ciphers or protocols are not FIPS compliant.
This flag is set to true when all the ciphers and protocols are secure. It is set to false when one of the ciphers or protocols is insecure.
SSL versions TLS1.1 and TLS1.2 are supported and enabled by default. SSLv2, SSLv3, and TLS1.0 are supported, but disabled by default.
Possible values are: SSL_V2 , SSL_V3 , TLS_V1 , TLS_V1_1 , TLS_V1_2
SSL session caching allows SSL client and server to reuse previously negotiated security parameters avoiding the expensive public key operation during handshake.
JSON Example
{
"cipher_group_label": "BALANCED",
"ciphers": [
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
],
"is_fips": false,
"is_secure": false,
"protocols": [
"SSL_V2"
],
"session_cache_enabled": false
}
Vendor Extensions
x-vmw-nsx-module: PolicyLoadBalancer