343
•
SSL handshake protocol, SSL change cipher spec protocol, and SSL alert protocol at the upper
layer.
Figure 104
SSL protocol stack
The following describes the major functions of SSL protocols:
•
SSL record protocol
—Fragments data received from the upper layer, computes and adds MAC to
the data, and encrypts the data.
•
SSL handshake protocol
—Negotiates the cipher suite used for secure communication, authenticates
the server and client, and securely exchanges the keys between the server and client. The cipher
suite that needs to be negotiated includes the symmetric encryption algorithm, key exchange
algorithm, and MAC algorithm.
•
SSL change cipher spec protocol
—Notifies the receiver that subsequent packets are to be protected
based on the negotiated cipher suite and key.
•
SSL alert protocol
—Sends alert messages to the receiving party. An alert message contains the alert
severity level and a description.
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode (see "
") and non-FIPS mode.
SSL configuration task list
Tasks at a glance
Remarks
Configuring an SSL server policy
Perform this configuration task on the SSL server.
Configuring an SSL client policy
Perform this configuration task on the SSL client.
Configuring an SSL server policy
An SSL server policy is a set of SSL parameters used by the SSL server. An SSL server policy takes effect
only after it is associated with an application such as HTTPS.
NOTE:
SSL versions include SSL 2.0, SSL 3.0, and TLS 1.0 (or SSL 3.1). When the device acts as the SSL server,
it can communicate with clients running SSL 3.0 or TLS 1.0. When the server receives an
SSL 2.0 Client
Hello message from a client supporting both SSL 2.0 and SSL 3.0/TLS 1.0,
it
notif
ies
the client to use
SSL 3.0 or TLS 1.0 for communication.