Cipher Suite Decryption Rule Conditions
The system provides predefined cipher suites you can add to a cipher suite rule condition for Block or Block with Reset rule actions. You can also add cipher suite list objects containing multiple cipher suites.
Important | Cipher suite rule conditions should be used only to block traffic, they should not be used to decrypt traffic. |
Note | You cannot add new cipher suites. You can neither modify nor delete predefined cipher suites. |
You can add a maximum of 50 cipher suites and cipher suite lists to the Selected Cipher Suites in a single cipher suite condition. The system supports adding the following cipher suites to a cipher suite condition:
-
SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA
-
SSL_RSA_FIPS_WITH_DES_CBC_SHA
-
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
-
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
-
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
-
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
-
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
-
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
-
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
-
TLS_DHE_RSA_WITH_DES_CBC_SHA
-
TLS_DH_Anon_WITH_AES_128_GCM_SHA256
-
TLS_DH_Anon_WITH_AES_256_GCM_SHA384
-
TLS_DH_Anon_WITH_CAMELLIA_128_CBC_SHA
-
TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256
-
TLS_DH_Anon_WITH_CAMELLIA_256_CBC_SHA
-
TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256
-
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
-
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
-
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
-
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
-
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
-
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
-
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
-
TLS_ECDHE_ECDSA_WITH_NULL_SHA
-
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
-
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
-
TLS_ECDHE_RSA_WITH_NULL_SHA
-
TLS_ECDHE_RSA_WITH_RC4_128_SHA
-
TLS_RSA_WITH_3DES_EDE_CBC_SHA
-
TLS_RSA_WITH_AES_128_CBC_SHA
-
TLS_RSA_WITH_AES_128_CBC_SHA256
-
TLS_RSA_WITH_AES_128_GCM_SHA256
-
TLS_RSA_WITH_AES_256_CBC_SHA
-
TLS_RSA_WITH_AES_256_CBC_SHA256
-
TLS_RSA_WITH_AES_256_GCM_SHA384
-
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
-
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
-
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
-
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
-
TLS_RSA_WITH_DES_CBC_SHA
-
TLS_RSA_WITH_NULL_MD5
-
TLS_RSA_WITH_NULL_SHA
-
TLS_RSA_WITH_RC4_128_MD5
-
TLS_RSA_WITH_RC4_128_SHA
Note the following:
-
If you add cipher suites not supported for your deployment, you cannot deploy your configuration. For example, passive deployments do not support decrypting traffic with the any of the ephemeral Diffie-Hellman (DHE) or ephemeral elliptic curve Diffie-Hellman (ECDHE) cipher suites. Creating a rule with these cipher suites prevents you from deploying your access control policy.
-
You can add an anonymous cipher suite to the Cipher Suite condition in decryption policy to use the rule, you must also configure your in an order that prevents ClientHello processing. For more information, see SSL Rule Order.
-
When specifying a cipher suite as a rule condition, consider that the rule matches on the negotiated cipher suite in the ServerHello message, rather than on the full list of cipher suites specified in the ClientHello message. During ClientHello processing, the managed device strips unsupported cipher suites from the ClientHello message. However, if this results in all specified cipher suites being stripped, the system retains the original list. If the system retains unsupported cipher suites, subsequent evaluation results in an undecrypted session.