Use the following procedure to configure SSL or TLS connections using the upgraded security protocols.
The Secure Sockets Layer protocol (SSL) and its compatible successor, the Transport Layer Security protocol (TLS), enable a client and server to establish a secure, encrypted connection over a public network. When you connect using SSL/TLS, the client authenticates the server before making a connection, and all data passed between the client and the server is encrypted. Depending on the server configuration, the server may also authenticate the client.
Authentication is accomplished by sending an X.509 security certificate. Authentication occurs automatically and invisibly as the first step of establishing an SSL/TLS connection. SSL/TLS connections require the client to authenticate the server. It is optional for the server to authenticate the client.
Once an encrypted connection is established, data is transmitted using the encryption level you have specified.
Supported Cryptographic Algorithms
Supported versions are: TLS version 1.2, TLS version 1.0 (the default) and SSL version 3.0. The list of cipher suites available for a given connection depends on the SSL/TLS version you specify, the encryption strength setting, and whether or not you are configured to run in FIPS mode.
NOTE:To secure your connections with SSL or TLS, your system must include an SSL/TLS host (server or servers).
To configure the session
From themenu, select , and click . Or, if a session is already open, choose > .
In the> , respond to the prompts to select the host type and the session type.
For the connection type, specify Telnet.
On thetab, specify the host name and port.
On thetab, for , choose the appropriate SSL or TLS option.
To ensure that the server certificate is valid, select. Extra! will check that the server certificate was signed by a trusted certificate authority and the host name in the certificate matches the host to which you are trying to connect.
If the SSL/TLS server requires client authentication, Extra! will automatically retrieve the certificate used for proving client identity, provided it is installed in the user's Personal certificate store in Windows.
Specify the remaining options to complete the configuration.
To change the security settings, in an open session, choose> , and on the left, click .