This article explains the list of ciphers supported by Smarts via SM_TLS_SUITE_LIST option in runcmd_env.sh file.
Smarts 10.1.X/24.3.x
SM_TLS_SUITE_LIST - A colon-separated list of the cipher suites that are allowed in TLS communication. A cipher suite is a suite of cryptographic algorithms used to provide encryption, integrity and authentication. This environment variable needs to be used only if some vulnerability is found on some cryptographic function, which must be disabled.
By default, Smart Assurance supports many cipher suites. The current preferred cipher suite uses RSA algorithm for Key-Exchange, RSA algorithm for Signature, AES-GCM(256) for encryption and SHA384 for message digest.
As of Smarts 10.1.12, the supported list of cipher suites, and the order in which they are prioritized.
ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA
Latest Document : Communication protocols overview [24.3.10]
Note: These cipher suites may change with each release and hence look into tech docs or please engage with the Technical Support via Service request to get the list of supported ciphers for any specific versions.