stcconfig cipherdisable

Disable the use of a symmetric encryption cipher algorithm for data encryption on an STC link. All data transmitted over the STC link will be encrypted using the cipher that is both enabled and that offers the highest level of security. For example, if AES 192 and AES 256 are enabled, and AES 128 is disabled, AES 256 will be used. You can use the command stcconfig ciphershow to show which ciphers are currently enabled and the command stc status to display the cipher that is currently being used.

NOTE   Performance is reduced for larger ciphers.

Syntax

stcconfig cipherdisable -slot <slot_ID> {-id <cipher_ID> | -all} [-force]

Argument(s) Shortcut Description
-all -a Disable all ciphers.
-force -f Force the action without prompting for confirmation.
-id <cipher_ID> -id Specifies the numerical identifier of the cipher you want to allow or disallow, as listed by stcconfig ciphershow
-slot <slot_ID> -s

Specifies the slot containing the partition for which you want to allow or disallow a cipher algorithm.

This argument is available only if you are logged into the HSM's Admin partition.

Example

lunacm:> stcconfig cipherdisable

This table lists the ciphers supported for STC links to the current slot.
Enabled ciphers are accepted during STC link negotiation with a client.
If all ciphers are disabled, STC links to the partition are not encrypted.
STC Encryption: On

 Cipher ID    Cipher Name                              Enabled
 __________________________________________________________________

 1            AES 128 Bit with Cipher Block Chaining   No

 2            AES 192 Bit with Cipher Block Chaining   Yes

 3            AES 256 Bit with Cipher Block Chaining   Yes

Command Result : No Error



lunacm:> stcconfig cipherdisable -id 3

AES 256 Bit with Cipher Block Chaining is now disabled for the current slot.

Command Result : No Error