Previous Topic

Next Topic

Book Contents

Book Index

Configuring protocols and ciphers for zones 2 and 3

This procedure describes how to configure SSL connections for zones 2 and 3 to work with specific protocols and ciphers.

NOTE: BMC recommends to use the TLSv1.2 protocol on all your components, as it is much more secure than the deprecated SSLv3, and TLSv1.0 protocols.

For each SSL connection, the same protocols and ciphers must be configured on both components that acts as the client and server for the connection.

To use more than one cipher, use a space to separate them.

To configure protocols and ciphers for zones 2 and 3:

  1. For each connection, run the following command on both the client and server computers:

    openssl ciphers -V

    The ciphers that appear on both computers can be used for the connection.

  2. Filter for the allowed ciphers according to the secured protocol, by running the following commands:
  3. Do one of the following:
  4. Edit the provider_options field, as follows:
    1. SSLProtocol=<desired protocol>, where <desired protocol> can be one or more of the following protocols:
      • * TLS1_2
      • * TLS1
      • * SSLv3
    2. After the last specified protocol, add a comma (,), and then the cipher suite specifier.

      For TLS1_2 protocol, the cipher suite specifier is TLSCipherSuite=. For SSLv3, and TLS1 protocols, the cipher suite specifier is SSLV3CipherSuite=. Then, specify the list of ciphers exactly as they appear in the available cipher list above.

      The cipher suite specifier and list of ciphers must be specified for each specified protocol.

  5. Verify in Control-M/Server and Control-M/Agent that the opensslciphers2java.txt file includes the cipher name with the mapping of openssl to java ciphers names by running the following command:

    openssl ciphers -stdname | grep <cipher name>

  6. Restart the relevant component.

    EXAMPLE:

    NOTE:

Parent Topic

Zone 2 and 3 SSL configuration