The requested article is not available. Either it doesn't apply to this version of the product or the relevant information is organized differently in this version of the docs. You can search, browse, or go back to the other version.
A newer release of this product is available.
SetNodeSupplementalTlsCiphers
-
PDF of this doc site
-
Manage storage with Element software
-
Protect your data
-
Perform replication between NetApp Element software and ONTAP (ONTAP CLI)
-
-
-

Collection of separate PDF docs
Creating your file...
This may take a few minutes. Thanks for your patience.
Your file is ready
You can use the SetNodeSupplementalTlsCiphers
method to specify the list of supplemental TLS ciphers. You can use this command on management nodes.
Parameter
|
You must call this method against the management node. For example: |
https://<management node IP>:442/json-rpc/10.0
This method has the following input parameter:
Name | Description | Type | Default value | Required |
---|---|---|---|---|
supplementalCiphers |
The supplemental cipher suite names using the OpenSSL naming scheme. Use of cipher suite names is case-insensitive. |
string |
None |
Yes |
Return values
This method has the following return values:
Name | Description | Type |
---|---|---|
mandatoryCiphers |
List of mandatory TLS cipher suites for the node. These are ciphers which are always active on the node. |
string |
supplementalCiphers |
List of supplemental TLS cipher suites for the node. |
string |
Request example
Requests for this method are similar to the following example:
{ "method": "SetNodeSupplementalTlsCiphers", "params": { "supplementalCiphers": [ "DHE-RSA-AES128-SHA256", "DHE-RSA-AES128-GCM-SHA256", "ECDHE-RSA-AES128-SHA256", "ECDHE-RSA-AES128-GCM-SHA256" ] }, "id": 1 }
Response example
This method returns a response similar to the following example:
{ "id" : 1, "result" : { "mandatoryCiphers": [ "DHE-RSA-AES256-SHA256", "DHE-RSA-AES256-GCM-SHA384", "ECDHE-RSA-AES256-SHA384", "ECDHE-RSA-AES256-GCM-SHA384" ], "supplementalCiphers": [ "DHE-RSA-AES128-SHA256", "DHE-RSA-AES128-GCM-SHA256", "ECDHE-RSA-AES128-SHA256", "ECDHE-RSA-AES128-GCM-SHA256" ] } }