Configuring the Minimum TLS Version and Cipher Suite¶
The Transport Layer Security (TLS) protocol provides confidentiality and integrity of data sent between applications over the Internet. HTTPS is a network protocol constructed based on TLS and HTTP for encrypted transmission and identity authentication. When Client Protocol for a domain name to be protected is set to HTTPS, you can use WAF to set the minimum TLS version and cipher suite (a set of cryptographic algorithms) for the domain name. All requests using the TLS earlier than the minimum TLS version cannot access the protected domain names so that your service is secured.
If Client Protocol for the domain name to be protected is set to HTTP, TLS is not involved. In this case, skip this section.
TLS v1.1 and the default cipher suite are configured by default in WAF for general security. To better protect your services, you are advised to set the minimum TLS version to a later version and cipher suite to the one having higher security.
Prerequisites¶
The domain name to be protected has been added.
Client Protocol is set to HTTPS for the protected domain name.
Procedure¶
Log in to the management console.
Click in the upper left corner of the management console and select a region or project.
Choose Security > Web Application Firewall > Domains. Figure 1 shows an example.
Note
In the upper part of the domain name list, click Quota details to view the domain name quota.
In the Name column, click the target domain name to go to the basic information page.
Click next to the cipher suite name in the row where TLS Configuration locates.
In the TLS Configuration dialog box, select the minimum TLS version and cipher suite. Table 1 describes the parameters.
¶ Parameter
Description
Minimum TLS Version
Minimum TLS version for accessing the protected domain name
TLS v1.1: Requests using TLS v1.1 or later can access the domain name.
TLS v1.2: Requests using TLS v1.2 or later can the access domain name.
Cipher Suite
Default cipher suite: Good browser compatibility, most clients supported, sufficient for most scenarios
Cipher suite 1: Recommended configuration, best combination of compatibility and security
Cipher suite 2: Strict compliance with forward secrecy requirements of PCI DSS and excellent protection, but older browsers may be unable to access the websites
Cipher suite 3: Support for ECDHE, DHE-GCM, and RSA-AES-GCM algorithms but not CBC
Important
NOTICE: Cipher suite 2 is not supported if TLS v1.1 is selected.
Click OK.