All Products
Document Center

CDN:Configure TLS versions and cipher suites

Last Updated:May 06, 2024

When a POP receives a request from a client, the POP initiates a Transport Layer Security (TLS) handshake with the client by using the configured TLS version to ensure communication security. If the client does not support the version, the connection cannot be established. To ensure a balance between outdated browser compatibility and security, you can configure a TLS version based on your business requirements. An earlier TLS version supports more browsers but degrades the security. A later TLS version enhances the security but may restrict access from outdated browsers.

Background information

TLS is designed to ensure the security and integrity of data that is transmitted between two applications. A typical use case of TLS is HTTPS. HTTPS, also known as HTTP over TLS, is a secure version of HTTP. HTTPS runs below the top application layer (HTTP) and above the transport layer (TCP). HTTPS provides data encryption and decryption services.



Mainstream browser


In 1999, RFC 2246 introduced TLS 1.0 as an update to SSL 3.0. However, TLS 1.0 is vulnerable to various attacks, such as BEAST and POODLE attacks. TLS 1.0 is no longer recommended for network protection due to weak encryption performance. TLS 1.0 is not compliant with Payment Card Industry Data Security Standard (PCI DSS).

  • Internet Explorer 6 and later

  • Google Chrome 1 and later

  • Firefox 2+

TLS 1.1

In 2006, RFC 4346 introduced TLS 1.1 as an update to TLS 1.0. TLS 1.1 fixed specific vulnerabilities in TLS 1.0.

  • Internet Explorer 11 and later

  • Google Chrome 22 and later

  • Firefox 24 and later

  • Safari 7 and later

TLS 1.2

In 2008, RFC 5246 introduced TLS 1.2, which is a widely used TLS version.

  • Internet Explorer 11 and later

  • Google Chrome 30 and later

  • Firefox 27 and later

  • Safari 7 and later

TLS 1.3

In 2018, RFC 8446 introduced TLS 1.3 as the latest TLS version. TLS 1.3 supports the zero round trip time (0-RTT) mode and allows you to establish faster connections. TLS 1.3 supports only key exchange algorithms of perfect forward secrecy to enhance security.

  • Google Chrome 70 and later

  • Firefox 63 and later


An SSL certificate is configured before you configure TLS. For more information, see Configure an SSL certificate.


By default, TLS 1.0, TLS 1.1, TLS 1.2, and TLS 1.3 are enabled.

  1. Log on to the Alibaba Cloud CDN console.

  2. In the left-side navigation pane, click Domain Names.

  3. On the Domain Names page, find the domain name that you want to manage and click Manage in the Actions column.

  4. In the left-side navigation tree of the domain name, click HTTPS.

  5. In the Configure TLS Cipher Suite and Version section, configure the cipher suite and versions based on your business requirements.


    The following cipher suites are supported. Select a cipher suite based on your business requirements:

    • All Cipher Suite Groups (Default): Provides low security and high compatibility. For information about supported encryption algorithms, see Default TLS encryption algorithms.

    • Enhanced Cipher Suite: Provides high security and low compatibility. Supported encryption algorithms:

      • TLS_AES_256_GCM_SHA384

      • TLS_AES_128_GCM_SHA256

      • TLS_CHACHA20_POLY1305_SHA256




      • ECDHE-RSA-AES128-GCM-SHA256




      • ECDHE-RSA-AES256-GCM-SHA384




      • ECDHE-ARIA256-GCM-SHA384


      • ECDHE-ARIA128-GCM-SHA256

    • Custom Cipher Suite: Select a cipher suite based on your business requirements.

    For more information about TLS versions, see Background information.