During a security audit or scan, or during regular use of the NSX-T API, you may find that certain TLS versions or encryption ciphers do not comply with your organization's security standards or needs.
VMware NSX-T Data Center
VMware NSX
VMware has always tried to follow industry standards when it comes to TLS and encryption ciphers for security purposes. This article is meant to provide information on the TLS and cypher versions that are used and how to disable / enable specific ciphers or TLS versions.
nmap -p 443 --script ssl-cert,ssl-enum-ciphers <NSX Manager IP>
GET https://[NSX-Manager-IP]/api/v1/cluster/api-service
curl -k -X GET -u admin https://[NSX-Manager-IP]/api/v1/cluster/api-service
{
"session_timeout" : 0,
"connection_timeout" : 30,
"protocol_versions" : [ {
"name" : "TLSv1.1",
"enabled" : false
}, {
"name" : "TLSv1.2",
"enabled" : true
}, {
"name" : "TLSv1.3",
"enabled" : true
} ],
"cipher_suites" : [ {
"name" : "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
"enabled" : true
}, {
"name" : "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
"enabled" : true
}, {
"name" : "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
"enabled" : true
}, {
"name" : "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
"enabled" : true
}, {
"name" : "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384",
"enabled" : true
}, {
"name" : "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
"enabled" : true
}, {
"name" : "TLS_RSA_WITH_AES_128_CBC_SHA",
"enabled" : true
}, {
"name" : "TLS_RSA_WITH_AES_128_CBC_SHA256",
"enabled" : true
}, {
"name" : "TLS_RSA_WITH_AES_128_GCM_SHA256",
"enabled" : true
}, {
"name" : "TLS_RSA_WITH_AES_256_CBC_SHA",
"enabled" : true
}, {
"name" : "TLS_RSA_WITH_AES_256_CBC_SHA256",
"enabled" : true
}, {
"name" : "TLS_RSA_WITH_AES_256_GCM_SHA384",
"enabled" : true
}, {
"name" : "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"enabled" : true
}, {
"name" : "TLS_AES_128_GCM_SHA256",
"enabled" : true
}, {
"name" : "TLS_AES_256_GCM_SHA384",
"enabled" : true
}, {
"name" : "TLS_CHACHA20_POLY1305_SHA256",
"enabled" : true
} ],
"redirect_host" : "",
"client_api_rate_limit" : 100,
"global_api_concurrency_limit" : 199,
"client_api_concurrency_limit" : 40,
"basic_authentication_enabled" : true,
"cookie_based_authentication_enabled" : true,
"resource_type" : "ApiServiceConfig",
"id" : "reverse_proxy_config",
"display_name" : "reverse_proxy_config",
"_system_owned" : false,
"_protection" : "NOT_PROTECTED",
"_create_time" : 1729695939951,
"_create_user" : "system",
"_last_modified_time" : 1731517707186,
"_last_modified_user" : "admin",
"_revision" : 8
}
PUT api/v1/cluster/api-service
curl -k -X GET -u admin https://[NSX-Manager-IP]/api/v1/cluster/api-service > filename.json
curl -k -u admin -X PUT -H "Content-Type: application/json" -H "X-Allow-Overwrite: true" -d "@path/to/body/file" https://[manager-ip]/api/v1/cluster/api-service
TLS v1.1 has been deprecated and is not recommended for general use.
Decision to disable the existing CIPHERS and TLS version being used should be taken in accordance with the security requirement of customer organization or only after a known vulnerability identification in the environment.