弹性负载均衡 ELB-TLS安全策略:安全策略差异说明
安全策略差异说明
安全策略 |
tls-1-0 |
tls-1-1 |
tls-1-2 |
tls-1-0-inherit |
tls-1-2-strict |
tls-1-0-with-1-3 |
tls-1-2-fs-with-1-3 |
tls-1-2-fs |
hybrid-policy-1-0 |
---|---|---|---|---|---|---|---|---|---|
TLS 协议 |
|||||||||
Protocol-TLS 1.3 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
Protocol-TLS 1.2 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
Protocol-TLS 1.1 |
√ |
√ |
- |
√ |
- |
√ |
- |
- |
√ |
Protocol-TLS 1.0 |
√ |
- |
- |
√ |
- |
√ |
- |
- |
- |
加密套件 |
|||||||||
EDHE-RSA-AES128-GCM-SHA256 |
√ |
√ |
√ |
- |
√ |
- |
- |
- |
- |
ECDHE-RSA-AES256-GCM-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-RSA-AES128-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-RSA-AES256-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
AES128-GCM-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
- |
- |
√ |
AES256-GCM-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
- |
- |
√ |
AES128-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
- |
- |
√ |
AES256-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
- |
- |
√ |
ECDHE-RSA-AES128-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
ECDHE-RSA-AES256-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
AES128-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
AES256-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
ECDHE-ECDSA-AES128-GCM-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES128-SHA256 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES128-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
ECDHE-ECDSA-AES256-GCM-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES256-SHA384 |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
√ |
ECDHE-ECDSA-AES256-SHA |
√ |
√ |
√ |
√ |
- |
√ |
- |
- |
√ |
ECDHE-RSA-AES128-GCM-SHA256 |
- |
- |
- |
√ |
- |
√ |
√ |
√ |
√ |
TLS_AES_256_GCM_SHA384 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
TLS_CHACHA20_POLY1305_SHA256 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
TLS_AES_128_GCM_SHA256 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
TLS_AES_128_CCM_8_SHA256 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
TLS_AES_128_CCM_SHA256 |
- |
- |
- |
- |
- |
√ |
√ |
√ |
- |
DHE-RSA-AES128-SHA |
- |
- |
- |
√ |
- |
- |
- |
- |
- |
DHE-DSS-AES128-SHA |
- |
- |
- |
√ |
- |
- |
- |
- |
- |
CAMELLIA128-SHA |
- |
- |
- |
√ |
- |
- |
- |
- |
- |
EDH-RSA-DES-CBC3-SHA |
- |
- |
- |
√ |
- |
- |
- |
- |
- |
DES-CBC3-SHA |
- |
- |
- |
√ |
- |
- |
- |
- |
- |
ECDHE-RSA-RC4-SHA |
- |
- |
- |
√ |
- |
- |
- |
- |
- |
RC4-SHA |
- |
- |
- |
√ |
- |
- |
- |
- |
- |
DHE-RSA-AES256-SHA |
- |
- |
- |
√ |
- |
- |
- |
- |
- |
DHE-DSS-AES256-SHA |
- |
- |
- |
√ |
- |
- |
- |
- |
- |
DHE-RSA-CAMELLIA256-SHA |
- |
- |
- |
√ |
- |
- |
- |
- |
- |
ECC-SM4-SM3 |
- |
- |
- |
- |
- |
- |
- |
- |
√ |
ECDHE-SM4-SM3 |
- |
- |
- |
- |
- |
- |
- |
- |
√ |