A.2.3, Ssl/tls security features, Appendix a: advanced settings – SENA Serial_IPTM Redirector 4.3 User Manual

Page 48: A.2.3 ssl/tls security features

Advertising
background image

Appendix A: Advanced Settings

A.2.1

Introduction

A.2.7

Configuring the Authentication Feature

A.2.2

Security Issues in Tactical Software Products

A.2.8

Configuring the Certificate Feature

A.2.3 SSL/TLS Security Features

A.2.9

Troubleshooting

A.2.4

What You Need to Get Started

A.2.10

COM/IP AT Commands

A.2.5

Enabling SSL/TLS Security Features

A.2.11

Certificate Authorities

A.2.6

Configuring the Encryption Feature

A.2.3 SSL/TLS Security Features

The SSL/TLS Security option adds three features to a Tactical Software product:

Encryption secures the data stream with a cipher and cipher strength that is negotiated when the
connection is established. The ciphers and strengths that can be used for connections are user-
configurable in the Control Panel. Available ciphers are RC2, RC4, DES, 3DES, and AES. Cipher
strengths range from 40 bits to 256 bits. The maximum cipher strength is subject to an upper limit
enforced by the product license key provided by the supplier of the software license. Not all ciphers work
with all strengths, and this is automatically managed by the software when it negotiates the network
connection.

Authentication checks the identify of the peer (the "other end" of the network connection) by validating
the certificate supplied by the peer. The specific checks applied to the certificate are user-configurable in
the Control Panel. Additionally, the certificate authorities (CA's) used to validate the certificate can either
come from a set of built-in CA's (which is the set of CA's used by Internet Explorer 6 and other browsers)
or from a user-supplied CA file. Appendix B provides a list of the built-in CA's.

Certificate allows the software to provide a certificate to the network connection peer. An unsecure
sample certificate is included with the Tactical Software product. The certificate used in an actual
application must be supplied in a user-specified file.

Usage

SSL/TLS Security features are used for various purposes, depending on the Tactical Software product:

Product

Encryption

Authentication

Certificate

A.2. SSL/TLS Security

Advertising