Configure TLSv1.3 for Secure Email Gateway (2024)

    Introduction

    This document describes the configuration of TLS v1.3 protocol for Cisco Secure Email Gateway (SEG).

    Prerequisites

    A general knowledge of the SEG settings and configuration is desired.

    Components Used

    • The information in this document is based on these software and hardware versions:
      • Cisco Secure Email Gateway (SEG) AsyncOS 15.5.1 and newer.
    • SEG SSL Configuration Settings.

    "The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command."

    Overview

    The SEG has integrated TLS v1.3 protocol to encrypt communications for SMTP and HTTPS-Related services; Classic UI, NGUI, and Rest API.

    TLS v1.3 Protocol boasts more secure communication and faster negotiation as the industry works to make it the standard.

    The SEG uses the existing SSL Configuration method within the SEG WebUI or CLI of SSL with a few notable settings to highlight.

    • Precautionary advice when configuring the permitted protocols.
    • The Ciphers cannot be manipulated.
    • TLS v1.3 can be configured for GUI HTTPS, Inbound Mail, and Outbound Mail.
    • The TLS protocol checkbox selection options between TLS v1.0 through TLS v1.3 use a pattern illustrated in more detail within the article.

    Configure

    The SEG integrates the TLS v1.3 protocol for HTTPS and SMTP within AsycOS 15.5. Caution is recommended when choosing the protocol settings to prevent HTTPS and email delivery/receiving failures.

    Previous releases of the Cisco SEG support TLS v1.2 at the high end along with other email providers such as MS O365 supporting TLS v1.2 at the time the article was written.

    The Cisco SEG implementation of the TLS v1.3 Protocol supports 3 default ciphers which cannot be changed or excluded within the SEG cipher configuration settings as the other protocols permit.

    The existing SEG SSL Configuration settings still permit manipulation of the TLS v1.0, v1.1, v1.2 manipulation to cipher suites.

    TLS 1.3 ciphers:

    TLS_AES_256_GCM_SHA384

    TLS_CHACHA20_POLY1305_SHA256

    TLS_AES_128_GCM_SHA256

    Configuration from the WebUI

    Navigate to > System Administration > SSL Configuration

    • The default TLS Protocol selection post upgrade to 15.5 AsyncOS includes TLS v1.1 and TLS v1.2 only.
    • The setting for "Other TLS Client Services" utilizes TLS v1.1 and TLS v1.2 with the option to select, only use TLS v1.0.

    Configure TLSv1.3 for Secure Email Gateway (1)

    Select "Edit Settings," to present the configuration options.

    • TLS v1.1 and TLS v1.2 are checked with active boxes to select the other protocols.
    • The ? next to each TLS v1.3 is a repeat of the static Cipher options.
    • The "Other TLS Client Services:" now presents the option to utilize TLS v1.0 only if selected.

    Configure TLSv1.3 for Secure Email Gateway (2)

    The TLS protocol selection options include TLS v1.0, TLS v1.1, TLS v1.2, TLS v1.3.

    • Post upgrade to AsyncOS 15.5, only TLS v1.1 and TLS v1.2 protocols are selected by default.

    Note: TLS1.0 is deprecated and thus disabled by default. TLS v1.0 is still available if the owner chooses to enable it.

    • The checkbox options light up with bolded boxes presenting the available Protocols and Grayed Out boxes for non-compatible options.
    • The sample options in the image illustrate the checkbox options.

    Configure TLSv1.3 for Secure Email Gateway (3)

    Post commit sample view of the selected TLS Protocols.

    Configure TLSv1.3 for Secure Email Gateway (4)

    Note: Modifications to the GUI HTTPS TLS Protocol causes a short disconnect to the WebUI due to the https service reset.

    CLI configuration:

    The SEG permits TLS v1.3 on 3 services:

    • GUI HTTPS
    • Inbound SMTP
    • Outbound SMTP

    Executing the command > sslconfig, outputs the currently configured Protocols and ciphers for GUI HTTPS, Inbound SMTP, Outbound SMTP

    • GUI HTTPS method: tlsv1_0tlsv1_1tlsv1_2tlsv1_3
    • Inbound SMTP method: tlsv1_0tlsv1_1tlsv1_2tlsv1_3
    • Outbound SMTP method: tlsv1_1tlsv1_2tlsv1_3

    Choose the operation you want to perform:

    • GUI - Edit GUI HTTPS ssl settings.
    • INBOUND - Edit Inbound SMTP ssl settings.
    • OUTBOUND - Edit Outbound SMTP ssl settings.

    []> inbound

    Enter the inbound SMTP SSL method you want to use.

    1. TLS v1.3
    2. TLS v1.2
    3. TLS v1.1
    4. TLS v1.0

    [2-4]> 1-3

    Note: The SEG selection process can include a single menu number such as 2, a range of menu numbers such as1-4, or menu numbers separated by commas 1,2,3.

    The CLI sslconfig subsequent prompts accept the existing value by pressing ‘enter’ or modifying the setting as desired.

    Complete the change with the command > commit >> enter an optional comment if desired >> press “Enter” to complete the changes.

    Verify

    This section includes some basic test scenarios and errors that can present due to mismatched TLS Protocol versions or syntax errors.

    Sample log entry of an SEG outgoing SMTP negotiation generating a rejection due to destination unsupported TLS v1.3:

    Wed Jan 17 20:41:18 2024 Info: DCID 485171 TLS deferring: (336151598, 'error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version') TLS version mismatch could be the failure reason

    Sample log entry of a sending SEG receiving a successfully negotiated TLS v1.3:

    Wed Jan 17 21:09:12 2024 Info: DCID 485206 TLS success protocol TLSv1.3 cipher TLS_AES_256_GCM_SHA384

    Sample log entry of a receiving SEG without TLS v1.3 enabled.

    Wed Jan 17 20:11:06 2024 Info: ICID 1020004 TLS failed: (337678594, 'error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol')

    Receiving SEG-supported TLS v1.3

    Wed Jan 17 21:09:12 2024 Info: ICID 1020089 TLS success protocol TLSv1.3 cipher TLS_AES_256_GCM_SHA384

    To verify your browser functionality, simply open a web browser session to the SEG WebUI or NGUI configured with TLSv1.3.

    Note: All the Web Browsers we tested are already configured to accept TLS v1.3.

    • Test: Configure the browser setting on Firefox disabling TLS v1.3 support produces errors on both the ClassicUI and the NGUI of the appliance.
    • Classic UI using Firefox configured to exclude TLS v1.3, as a test.
    • NGUI would receive the same error with the only exception being the port number 4431(default) within the URL.

    Configure TLSv1.3 for Secure Email Gateway (5)

    • To ensure communication Verify Browser settings to ensure TLSv1.3 is included. (This sample is from Firefox and utilizes numbers 1-4

    Configure TLSv1.3 for Secure Email Gateway (6)

    Related Information

    • Cisco Secure Email Gateway - Setup Guide
    • Cisco Secure Email Gateway Launch Page to Support Guides
    • Cisco Secure Email Gateway - Release Notes
    Configure TLSv1.3 for Secure Email Gateway (2024)

    References

    Top Articles
    Latest Posts
    Article information

    Author: Francesca Jacobs Ret

    Last Updated:

    Views: 6020

    Rating: 4.8 / 5 (68 voted)

    Reviews: 83% of readers found this page helpful

    Author information

    Name: Francesca Jacobs Ret

    Birthday: 1996-12-09

    Address: Apt. 141 1406 Mitch Summit, New Teganshire, UT 82655-0699

    Phone: +2296092334654

    Job: Technology Architect

    Hobby: Snowboarding, Scouting, Foreign language learning, Dowsing, Baton twirling, Sculpting, Cabaret

    Introduction: My name is Francesca Jacobs Ret, I am a innocent, super, beautiful, charming, lucky, gentle, clever person who loves writing and wants to share my knowledge and understanding with you.