Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Starting from SBR 8.6.0R7 and 8.6.0R8 release, the following features are supported

 
  1. The following weak cipher suites are now optionally available to support legacy clients.
    • [0x2f] AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA

    • [0x35] AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA

    • [0x3c] AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256

    • [0x3d] AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256

  2. If the above cipher suites are needed to support legacy devices, they may be added.

    By default, SBR is configured to use the following cipher suites for TLS and TTLS 0x0067,0x006B,0xC030,0xC028,0xC014,0xC013.

    If needed, the weak cipher suites mentioned above can be configured in the Web GUI under RADIUS Configuration > Authentication Policies > EAP Methods > EAP-TLS/EAP-TTLS > Advanced Server Settings tab