You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I recently worked on a project where we had implemented the TLS best practices then were unable to make a connection via EDT. The connection worked via regular TCP. When not going through the ADC the connection did use EDT. We were able to correct the issue by adding the Cipher Group DTLS_DEFAULT to the VServer, however that lowered our SSLLabs score from A+ to a B.
After further troubleshooting it looks like you need the following additional ciphers added to your custom group and still maintain an SSLLabs A+ rating. Can you confirm this and update the document with this information?
I recently worked on a project where we had implemented the TLS best practices then were unable to make a connection via EDT. The connection worked via regular TCP. When not going through the ADC the connection did use EDT. We were able to correct the issue by adding the Cipher Group DTLS_DEFAULT to the VServer, however that lowered our SSLLabs score from A+ to a B.
After further troubleshooting it looks like you need the following additional ciphers added to your custom group and still maintain an SSLLabs A+ rating. Can you confirm this and update the document with this information?
TLS1.2-ECDHE-RSA-AES-256-SHA384
TLS1-ECDHE-RSA-AES256-SHA
TLS1-ECDHE-RSA-AES128-SHA
Thansk
Brian Bresnahan
[email protected]
https://docs.citrix.com/en-us/tech-zone/build/tech-papers/networking-tls-best-practices.html
The text was updated successfully, but these errors were encountered: