When you add HTTPS listeners, you can select appropriate security policies to improve security. A security policy is a combination of TLS protocols of different versions and supported cipher suites.
Security Policy |
Description |
TLS Versions |
Cipher Suites |
---|---|---|---|
TLS-1-0 |
TLS 1.0, TLS 1.1, and TLS 1.2 and supported cipher suites (high compatibility and moderate security) |
TLS 1.2 TLS 1.1 TLS 1.0 |
|
TLS-1-1 |
TLS 1.1 and TLS 1.2 and supported cipher suites (moderate compatibility and moderate security) |
TLS 1.2 TLS 1.1 |
|
TLS-1-2 |
TLS 1.2 and supported cipher suites (moderate compatibility and high security) |
TLS 1.2 |
|
TLS-1-0-Inherit |
TLS 1.0, TLS 1.1, and TLS 1.2 and supported cipher suites (high compatibility and moderate security) |
TLS 1.2 TLS 1.1 TLS 1.0 |
|
TLS-1-2-Strict |
Strict TLS 1.2 and supported cipher suites (low compatibility and ultra-high security) |
TLS 1.2 |
|
TLS-1-0-WITH-1-3 (for dedicated load balancers) |
TLS 1.0 and later, and supported cipher suites (ultra-high compatibility and low security) |
TLS 1.3 TLS 1.2 TLS 1.1 TLS 1.0 |
|
TLS-1-2-FS-WITH-1-3 (for dedicated load balancers) |
TLS 1.2 and later, and supported forward secrecy cipher suites (high compatibility and ultra-high security) |
TLS 1.3 TLS 1.2 |
|
TLS-1-2-FS |
TLS 1.2 and supported forward secrecy cipher suites (moderate compatibility and ultra-high security) |
TLS 1.2 |
|
hybrid-policy-1-0 (dedicated load balancers) |
TLS 1.1 and TLS 1.2 and supported cipher suites (moderate compatibility and moderate security) |
TLS 1.2 TLS 1.1 |
|
tls-1-2-strict-no-cbc (dedicated load balancers) |
TLS 1.2 and supported cipher suites that exclude CBC encryption algorithm (low compatibility and ultra-high security) |
TLS 1.2 |
|
Security Policy |
TLS-1-0 |
TLS-1-1 |
TLS-1-2 |
TLS-1-0-Inherit |
TLS-1-2-Strict |
TLS-1-0-WITH-1-3 |
TLS-1-2-FS-WITH-1-3 |
TLS-1-2-FS |
Hybrid-Policy-1-0 |
---|---|---|---|---|---|---|---|---|---|
TLS versions |
|||||||||
TLS 1.3 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
TLS 1.2 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
TLS 1.1 |
√ |
√ |
- |
√ |
- |
√ |
- |
- |
√ |
TLS 1.0 |
√ |
- |
- |
√ |
- |
√ |
- |
- |
- |
Cipher suite |
|||||||||
EDHE-RSA-AES128-GCM-SHA256 |
√ |
√ |
√ |
- |
√ |
- |
- |
- |
- |
ECDHE-RSA-AES256-GCM-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-RSA-AES128-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-RSA-AES256-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
AES128-GCM-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
- |
- |
√ |
AES256-GCM-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
- |
- |
√ |
AES128-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
- |
- |
√ |
AES256-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
- |
- |
√ |
ECDHE-RSA-AES128-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
ECDHE-RSA-AES256-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
AES128-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
AES256-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
ECDHE-ECDSA-AES128-GCM-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES128-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES128-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
ECDHE-ECDSA-AES256-GCM-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES256-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES256-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
ECDHE-RSA-AES128-GCM-SHA256 |
- |
- |
- |
√ |
- |
√ |
√ |
√ |
√ |
TLS_AES_256_GCM_SHA384 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
TLS_CHACHA20_POLY1305_SHA256 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
TLS_AES_128_GCM_SHA256 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
TLS_AES_128_CCM_8_SHA256 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
TLS_AES_128_CCM_SHA256 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
Parameter |
Description |
Example Value |
---|---|---|
Name |
Specifies the name of the custom security policy. |
tls-test |
TLS Version |
Specifies the TLS version supported by the custom security policy. You can select multiple versions:
|
- |
Cipher Suite |
Specifies the cipher suites that match the selected TLS versions. |
- |
Description |
Provides supplementary information about the custom security policy. |
- |
You can modify a custom security policy as you need.
You can delete a custom security policy as you need.
When you change a security policy, ensure that the security group containing backend servers allows traffic from 100.125.0.0/16 to backend servers and allows ICMP packets for UDP health checks. Otherwise, backend servers will be considered unhealthy, and routing will be affected.