hsm stc cipher disable
Disable the use of a symmetric encryption cipher algorithm for data encryption on the secure trusted channel (STC) admin channel.The STC admin channel is local to the appliance, and is used to transmit data between the local services and applications running on the appliance (such as LunaSH, NTLS, and the STC service) and the HSM SO partition.
All data transmitted over the STC link will be encrypted using the cipher that is both enabled and that offers the highest level of security. For example, if AES 192 and AES 256 are enabled, and AES 128 is disabled, AES 256 will be used. You can use the command hsm stc cipher show to show which ciphers are currently enabled/disabled.
NOTE Performance is reduced for larger ciphers.
User Privileges
Users with the following privileges can perform this command:
>Admin
>Operator
Syntax
hsm stc cipher disable {-all | -id <cipher_id>} [-force]
Argument(s) | Shortcut | Description |
---|---|---|
-all | -a | Disable all ciphers. |
-id <cipher_id> | -i | Specifies the numerical identifier of the cipher you want to disable, as listed using the command stc cipher show |
-force | -f | Force the action without prompting. |
Example
lunash:>hsm stc cipher disable -id 3 AES 256 Bit with Cipher Block Chaining is now disabled. Command Result : 0 (Success)