40-bit Encryption
|
Select this option if you want to allow 40-bit (weak) Secure Sockets
Layer (SSL) connections. If you do not select this option, only 128-bit connections
are supported.
If you disable this option, the user needs to ensure that the browser
is configured to support the required connection type.
Note –
The user needs to do the following in the case of Netscape Navigator
4.7x:
-
Select Security Info under Tools in the Communicator menu.
-
Click the Navigator link in the left pane.
-
Click Configure SSL v2 or Configure SSL v3 under Advanced
Security (SSL) Configuration.
-
Enable the required ciphers.
|
Null Ciphers
|
Select the Enable Null Ciphers checkbox to enable null ciphers.
|
SSL Cipher Selection
|
Secure Remote Access supports a number of standard ciphers. You have
the option of supporting all the pre-packaged ciphers, or selecting the required
ciphers individually. You can select specific SSL ciphers for each Gateway
instance. If any of the selected ciphers is present at the client site, the
SSL handshake occurs successfully.
|
SSL Version 2.0
|
Select the Enable SSL Version 2.0 checkbox to enable version 2.0. This
option is enabled by default.
You can enable or disable SSL version 2.0. Disabling SSL 2.0 means that
browsers that support only the older SSL 2.0 cannot authenticate to Secure
Remote Access. This ensures a greater level of security.
|
SSL2 Ciphers
|
Select the Enable SSL Cipher Selection checkbox option.
You can select the required ciphers from the list of SSL ciphers.
|
SSL Version 3.0
|
You can enable or disable SSL version 3.0. Disabling SSL 3.0 means that
browsers that support only the SSL 3.0 cannot authenticate to SRA software.
This ensures a greater level of security.
Select the Enable SSL Version 3.0 checkbox to enable version 3.0.
|
SSL3 Ciphers
|
Select the Enable SSL Cipher Selection checkbox option.
You can select the required ciphers from the list of SSL3 ciphers.
|
TLS Ciphers
|
Select the Enable SSL Cipher Selection checkbox option.
You can select the required ciphers from the list of TLS ciphers.
|