Reset Search
 

 

Article

5739 - Enable Perfect forward secrecy (PFS) on virtual traffic manager

« Go Back

Information

 
Last Modified Date11/25/2017 10:17 PM
Synopsis
This article provides supportability and how to enable PFS cipher suites on vTM.
Problem or Goal
Cause
Solution
By default, PFS ciphers are enabled. Some non-PFS ciphers are given higher priority (in the default order) for better performance. Please note, special consideration is required before enabling PFS ciphers only as there may be non-PFS-capable browsers around. Therefore it is recommended, in addition to PFS cipher suites, to have few compatibility cipher suites configured as well.

To edit cipher suites offered on vTM globally, perform the following steps:
  1. Login to vTM admin console
  2. Navigate to System > Global Settings
  3. Expand the SSL Configuration menu
User-added image
  1. In the ssl!cipher_suites field, enter the desired cipher suites
User-added image
  1. Click Update
To edit cipher suites each virtual server individually, perform the following steps:
  1. Login to vTM admin console
  2. Navigate to System > Virtual Server
  3. From the list, find the corresponding virtual server and click Edit
  4. Expand the SSL Decryption menu
User-added image
  1. In the ssl!cipher_suites field, enter the desired cipher suites
User-added image
  1. Click Update

Following PFS cipher suites are supported by Pulse Secure Virtual Traffic Manager (vTM):

vTM 10.4 and greater:

# /opt/zeus/zxtm/bin/zeus.zxtm --ciphers | egrep "SSL_ECDHE|SSL_DHE_RSA|Other"
SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256
SSL_DHE_RSA_WITH_AES_128_GCM_SHA256
SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256
SSL_DHE_RSA_WITH_AES_128_CBC_SHA256
SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA
SSL_DHE_RSA_WITH_AES_128_CBC_SHA
SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384
SSL_DHE_RSA_WITH_AES_256_GCM_SHA384
SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384
SSL_DHE_RSA_WITH_AES_256_CBC_SHA256
SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA
SSL_DHE_RSA_WITH_AES_256_CBC_SHA
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA

Other ciphers (disabled by default):
SSL_DHE_RSA_WITH_DES_CBC_SHA
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA


vTM 10.0 to vTM 10.3:

# /opt/zeus/zxtm/bin/zeus.zxtm --ciphers | egrep "SSL_ECDHE|SSL_DHE_RSA|Other"
SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256
SSL_DHE_RSA_WITH_AES_128_GCM_SHA256
SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256
SSL_DHE_RSA_WITH_AES_128_CBC_SHA256
SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA
SSL_DHE_RSA_WITH_AES_128_CBC_SHA
SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384
SSL_DHE_RSA_WITH_AES_256_GCM_SHA384
SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384
SSL_DHE_RSA_WITH_AES_256_CBC_SHA256
SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA
SSL_DHE_RSA_WITH_AES_256_CBC_SHA
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Other ciphers (disabled by default):
SSL_DHE_RSA_WITH_DES_CBC_SHA
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA


vTM 9.9:

# /opt/zeus/zxtm/bin/zeus.zxtm --ciphers | egrep "SSL_ECDHE|SSL_DHE_RSA|Other"
SSL_DHE_RSA_WITH_AES_128_GCM_SHA256
SSL_DHE_RSA_WITH_AES_128_CBC_SHA256
SSL_DHE_RSA_WITH_AES_128_CBC_SHA
SSL_DHE_RSA_WITH_AES_256_GCM_SHA384
SSL_DHE_RSA_WITH_AES_256_CBC_SHA256
SSL_DHE_RSA_WITH_AES_256_CBC_SHA
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Other ciphers (disabled by default):
SSL_DHE_RSA_WITH_DES_CBC_SHA
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Related Links
Attachment 1 
Created ByVenkataKondaReddy Palem

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255