A.2.3, Ssl/tls security features, Appendix a: advanced settings – SENA Serial_IPTM Redirector 4.3 User Manual
Page 48: A.2.3 ssl/tls security features
![background image](/manuals/292730/48/background.png)
Appendix A: Advanced Settings
A.2.1
Configuring the Authentication Feature
A.2.2
Security Issues in Tactical Software Products
Configuring the Certificate Feature
A.2.3 SSL/TLS Security Features
A.2.4
A.2.10
A.2.5
Enabling SSL/TLS Security Features
A.2.11
A.2.6
Configuring the Encryption Feature
A.2.3 SSL/TLS Security Features
The SSL/TLS Security option adds three features to a Tactical Software product:
●
Encryption secures the data stream with a cipher and cipher strength that is negotiated when the
connection is established. The ciphers and strengths that can be used for connections are user-
configurable in the Control Panel. Available ciphers are RC2, RC4, DES, 3DES, and AES. Cipher
strengths range from 40 bits to 256 bits. The maximum cipher strength is subject to an upper limit
enforced by the product license key provided by the supplier of the software license. Not all ciphers work
with all strengths, and this is automatically managed by the software when it negotiates the network
connection.
●
Authentication checks the identify of the peer (the "other end" of the network connection) by validating
the certificate supplied by the peer. The specific checks applied to the certificate are user-configurable in
the Control Panel. Additionally, the certificate authorities (CA's) used to validate the certificate can either
come from a set of built-in CA's (which is the set of CA's used by Internet Explorer 6 and other browsers)
or from a user-supplied CA file. Appendix B provides a list of the built-in CA's.
●
Certificate allows the software to provide a certificate to the network connection peer. An unsecure
sample certificate is included with the Tactical Software product. The certificate used in an actual
application must be supplied in a user-specified file.
Usage
SSL/TLS Security features are used for various purposes, depending on the Tactical Software product:
Product
Encryption
Authentication
Certificate
A.2. SSL/TLS Security