Applies To:Show Versions
BIG-IP Link Controller
Create a custom Server SSL profile that supports C3D
On the Main tab, click
. The Server SSL profile list screen opens.
The New Server SSL Profile screen opens.
- In the Name field, type a unique name for the profile.
- From the Parent Profile list, select serverssl.
- From the Configuration list, select Advanced.
Select the Custom check box.
The settings become available for change.
From the Certificate list, select the
name of an SSL certificate on the BIG-IP system.
Important: If the BIG-IP system is part of a DSC Sync-Failover group, always select a non-default certificate name, and ensure that this same certificate name is specified in every instance of this SSL profile in the device group. Taking these actions helps to ensure that SSL handshakes are successful after a failover event.
From the Key list, select the name of
an SSL key on the BIG-IP system.
Important: If the BIG-IP system is part of a DSC Sync-Failover group, always select a non-default key name, and ensure that this same key name is specified in every instance of this SSL profile in the device group. Taking these actions helps to ensure that SSL handshakes are successful after a failover event.
- In the Pass Phrase field, type a pass phrase that enables access to the certificate/key pair on the BIG-IP system.
- From the Chain list, select the name of an SSL chain on the BIG-IP system.
For the Ciphers setting, specify a
cipher group or cipher string by choosing one of these options.
Note: If you specified an ECDSA certificate key chain in the Certificate Key Chain setting, you must include the cipher string ECDHE_ECDSA in the cipher group or cipher string that you specify in the Ciphers setting. (At a minimum, you should specify a cipher group or string such as DEFAULT:ECDHE_ECDSA.) This is necessary to ensure successful cipher negotiation when the BIG-IP system is offered an ECDSA-based certificate only.
Option Description Cipher Group
Select an existing cipher group from the list when you want to use a system-defined or custom cipher group to define the ciphers that the BIG-IP system uses for negotiating SSL connections. Here's an example of the Ciphers setting where we've selected a custom cipher group that we created earlier.
Type a cipher string in the box if you want to manually specify a cipher string instead of selecting a cipher group. For security and performance reasons, consider following these recommendations:
- Always append ciphers to the DEFAULT cipher string.
- Type a cipher string that includes the ECC key type, because its shorter length speeds up encryption and decryption while still offering virtually the same level of security.
- Disable ADH ciphers but also include the keyword HIGH. To do this, just include both !ADH and :HIGH in your cipher string.
- For AES, DES, and RC4 encryption types, make sure you specify the DHE key exchange method. DHE uses Forward Privacy, which creates a key that it throws away after each session so that the same session key never gets used twice. When you use DHE, make sure that the SSL private key isn't being shared with a monitoring system or a security device like an intrusion detection or prevention system. Also, diagnostic tools like ssldump won't work when you're using Forward Secrecy.
- Disable EXPORT ciphers by including !EXPORT in the cipher string.
- If you can live with removing support for the SSLv3 protocol version, do it. This protocol version is not secure. Simply include :!SSLv3 in any cipher string you type.
Here's an example of the Ciphers setting where we have opted to manually type the cipher string DEFAULT:ECDHE-RSA-AES-128-GCM-SHA256:!ADH:!EXPORT:HIGH:
- In the same area of the screen, configure any other settings as needed.
Select the Custom check box for the Server Authentication area of the screen.
The settings become available for change.
- Change or retain the values for all Server Authentication settings as needed.
If you intend to use OCSP stapling, then from the OCSP list, select the OCSP
object that the BIG-IP system's SSL should use to connect to the OCSP responder
and to check the server certificate status. You can click the + icon to open the
create-new OCSP object screen.
The OCSP stapling object can be added in both forward and reverse proxy configurations. When the server SSL Forward Proxy property is set to Enabled, the forward proxy OCSP object is used to validate and staple the web server's certificate status. When the server SSL Forward Proxy property is set to Disabled, the reverse proxy OCSP object is used to reset the client connection if the web server certificate has been revoked.
Select the Custom check box for the
Client Certificate Constrained Delegation section.
The settings become available for change.Note: See About client certificate constrained delegation prior to enabling C3D.
- From the Client Certificate Constrained Delegation setting, select Advanced.
- From the Client Certificate Constrained Delegation list, select Enabled.
- From the CA Certificate list, select the name of the certificate file that is used as the certification authority certificate.
- From the CA Key list, select the name of the key file that is used as the certification authority key.
In the CA Passphrase field, type the
passphrase of the key file that is used as the certification authority
Note: This should be the passphrase corresponding to the specified CA Key.
- For the Confirm CA Passphrase field, type the identical passphrase.
For the Certificate Lifespan fields,
type the lifespan of the certificate generated that is using the SSL client
certificate constrained delegation.
The default is 1 day, 0 hours.
- To define the extensions of the client certificates to be included in the generated certificates, from the Certificate Extensions list, select Extensions List.
For the Certificate Extensions List
setting, click Disable
or Enable to add or
remove available extensions.
- Basic Constraints: Uses basic constraints to indicate whether the certificate belongs to a CA.
- Extended Key Usage: Uses Extended Key Usage, typically on a leaf certificate, to indicate the purpose of the public key contained in the certificate.
- Key Usage: Provides a bitmap specifying the cryptographic operations that may be performed using the public key contained in the certificate; for example, it could indicate that the key should be used for signature but not for enciphering.
- Subject Alternative Name: Allows identities to be bound to the subject of the certificate. These identities may be included in addition to, or in place of, the identity in the subject field of the certificate.
You can also add extensions in the Custom extension field. Type in the extension name and click Add.
- Click Finished.