Forum Discussion
Allow TLS1.2 Only
BIG-IP LTM running v12.1.2 HF2. End goal is to allow TLS1.2 only. We tried the steps below but application failed to launch.
Followed this guide to reconfigure Client SSL Profile. https://support.f5.com/csp/article/K17370
We already have a custom SSL_Custom_Web profile which we updated. 1. Local Traffic >> Profiles >> SSL >> Client >> SSL_Custom_Web >> Configuration >> Advanced. 2. Ciphers text box >> replace DEFAULT with TLSv1_2.
Should I have appended TLSv1_2 instead of replacing DEFAULT?
- James_Smith_299
Nimbostratus
Client uses Windows 7 SP1 Enterprise / Internet Explorer 11 32-bit.
- Sunny_291145
Nimbostratus
Can you give a try on using below one
TLSv1_2:!DES:!3DES:!RC4:!ADH
- James_Smith_299
Nimbostratus
Hi Sunny,
That string will allow TLS1.2 protocol and block the following 4 Ciphers? DES 3DES RC4 ADH
My customer's goal is to allow any Cipher that uses TLS1.2. Or is your suggestion in consideration of Win7 / IE11 context?
- Sunny_291145
Nimbostratus
Yes this will block those 4 Ciphers and windows servers will block those due to week Ciphers
- Dali_Chauhan_33
Nimbostratus
Log in to the Configuration utility.
Navigate to Local Traffic > Profiles > SSL > Client.
Click Create to create a new profile, or click the name of an existing profile to edit it.
For a new profile, under General Properties, type a name.
For Configuration, click Advanced.
For Ciphers, select the Custom check box.
(BIG-IP 13.0.0 and later) Under Configuration, for Ciphers, click Cipher String.
Type the cipher string into the Cipher String box.
For example, the following string configures an SSL profile to use only TLSv1.2 protocol ciphers:
TLSv1_2
- James_Smith_299
Nimbostratus
Hi Dali,
Those are the exact steps I followed. In my case I updated an existing SSL Client Profile. In the Cipher text box, replaced DEFAULT with TLSv1_2. Could the issue lie somewhere on the Windows 7 / Internet Explorer 11 client?
- JG
Cumulonimbus
Rather than removing ciphers supported for the unwanted versions of SSL/TLS, simply disable the support of those insecure protocols.
Within the SSL profile, select from "Options List" the following:
- No SSLv2
- No SSLv3
- No TLSv1
- No TLSv1.1
.
Keep in mind that there could be a lot of clients out there that do not use TLSv1.2, particularly those used for internal service integration purposes; they are typically lagging behind in maintenance.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com