Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Secure Connect Gateway 5.x — Virtual Edition User's Guide

Configuring your environment

The Environment configuration page enables you to configure your proxy server settings, SMTP server settings, enable or disable VMware tools, and manage security certificates. You can also ensure connectivity between secure connect gateway and the Policy Manager server.

If the local system connects to the Internet through a proxy server, you must configure the proxy server settings. If your company uses an SMTP server, it is recommended that you configure the SMTP server settings to receive email notifications.

Supported TLS configurations

TLS 1.0 and 1.1 are no longer supported on secure connect gateway. Devices can communicate with secure connect gateway only through TLS 1.2 and 1.3.

If you have devices or services using TLS 1.0 or 1.1 versions, they are automatically disconnected from secure connect gateway. To monitor the disconnected devices, update them to TLS 1.2 or 1.3. You can check the connection status on the Environment configuration page and the Devices page.

The following devices and services may get disconnected if they are using TLS 1.0 or 1.1:

  • SMTP server
  • LDAP server
  • iDRAC server
  • ME4 storage
  • Dell Compellent storage
  • HitKit or VMware Service Manager (VSM)
  • WebScale
  • ML3 Tape library
  • Chassis MX7000
  • Data storage and HCI and CI Products, Data Protection
The supported ciphers for devices and services to communicate with secure connect gateway are:
  • Server supported ciphers:
    • TLS 1.2 Ciphers
      • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
      • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
      • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
      • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
      • TLS_ECDHE_ECDSA_WITH_AES_128_CCM
      • TLS_ECDHE_ECDSA_WITH_AES_256_CCM
      • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
      • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8
    • TLS 1.3 Ciphers
      • TLS_AES_256_GCM_SHA384
  • Client supported ciphers:
    • TLS 1.2 Ciphers
      • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
      • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
      • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
      • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
      • TLS_ECDHE_ECDSA_WITH_AES_128_CCM
      • TLS_ECDHE_ECDSA_WITH_AES_256_CCM
      • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
      • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8
    • TLS 1.3 Ciphers
      • TLS_AES_256_GCM_SHA384
      • TLS_AES_128_GCM_SHA256
      • TLS_AES_128_CCM_8_SHA256
      • TLS_AES_128_CCM_SHA256
      • TLS_CHACHA20_POLY1305_SHA256

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\