During a security audit or scan, or during regular use of the NSX-T API, you may find that certain TLS versions or encryption ciphers do not comply with your organization's security standards or needs.
VMware NSX-T Data Center
VMware NSX
VMware has always tried to follow industry standards when it comes to TLS and encryption ciphers for security purposes. This article is meant to provide information on the TLS and cypher versions that are used and how to disable / enable specific ciphers or TLS versions.
Host / Transport Node TLS/ciphers over port 1235 are not currently configurable in NSX-T.
Host control over port 1235 uses TLS v1.2.
GET https://[NSX-Manager-IP]/api/v1/cluster/api-servicecurl -k -X GET -u admin https://[NSX-Manager-IP]/api/v1/cluster/api-service{ "session_timeout" : 0, "connection_timeout" : 30, "protocol_versions" : [ { "name" : "TLSv1.1", "enabled" : false }, { "name" : "TLSv1.2", "enabled" : true }, { "name" : "TLSv1.3", "enabled" : true } ], "cipher_suites" : [ { "name" : "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", "enabled" : true }, { "name" : "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256", "enabled" : true }, { "name" : "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", "enabled" : true }, { "name" : "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA", "enabled" : true }, { "name" : "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384", "enabled" : true }, { "name" : "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", "enabled" : true }, { "name" : "TLS_RSA_WITH_AES_128_CBC_SHA", "enabled" : true }, { "name" : "TLS_RSA_WITH_AES_128_CBC_SHA256", "enabled" : true }, { "name" : "TLS_RSA_WITH_AES_128_GCM_SHA256", "enabled" : true }, { "name" : "TLS_RSA_WITH_AES_256_CBC_SHA", "enabled" : true }, { "name" : "TLS_RSA_WITH_AES_256_CBC_SHA256", "enabled" : true }, { "name" : "TLS_RSA_WITH_AES_256_GCM_SHA384", "enabled" : true }, { "name" : "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "enabled" : true }, { "name" : "TLS_AES_128_GCM_SHA256", "enabled" : true }, { "name" : "TLS_AES_256_GCM_SHA384", "enabled" : true }, { "name" : "TLS_CHACHA20_POLY1305_SHA256", "enabled" : true } ], "redirect_host" : "", "client_api_rate_limit" : 100, "global_api_concurrency_limit" : 199, "client_api_concurrency_limit" : 40, "basic_authentication_enabled" : true, "cookie_based_authentication_enabled" : true, "resource_type" : "ApiServiceConfig", "id" : "reverse_proxy_config", "display_name" : "reverse_proxy_config", "_system_owned" : false, "_protection" : "NOT_PROTECTED", "_create_time" : 1729695939951, "_create_user" : "system", "_last_modified_time" : 1731517707186, "_last_modified_user" : "admin", "_revision" : 8}Loadbalancer >SSL profile > custom PUT api/v1/cluster/api-servicecurl -k -X GET -u admin https://[NSX-Manager-IP]/api/v1/cluster/api-service > filename.jsoncurl -k -u admin -X PUT -H "Content-Type: application/json" -H "X-Allow-Overwrite: true" -d "@path/to/body/file" https://[manager-ip]/api/v1/cluster/api-service
TLS v1.1 has been deprecated and is not recommended for general use.
Decision to disable the existing CIPHERS and TLS version being used should be taken in accordance with the security requirement of customer organization or only after a known vulnerability identification in the environment.