All Products
Search
Document Center

Server Load Balancer:TLS security policy

Last Updated:Mar 27, 2026

When you configure an HTTPS listener for a Classic Load Balancer (CLB) instance, the TLS security policy determines the TLS protocol versions and cipher suites used for TLS negotiation between the CLB instance and clients. CLB offers a selection of predefined TLS security policies.

How it works

A tls security policy on a CLB instance specifies the supported tls protocol versions and cipher suites for tls negotiation. During the tls handshake, the client sends a list of supported protocol versions and cipher suites in a Client Hello message. Based on the policy, the CLB instance selects a mutually supported protocol version and cipher suite from the client's list and responds with a Server Hello message. The selected combination determines subsequent steps, such as key exchange and session key generation.

TLS security policy

To comply with certain information security standards, you may need to apply a specific TLS security policy to CLB. This table lists the TLS protocol versions and cipher suites for each policy to help you select one based on your requirements. CLB does not support custom TLS security policies. For custom policies, use Application Load Balancer (ALB) or Network Load Balancer (NLB).

For Internet-facing applications without special compatibility requirements, we recommend using tls_cipher_policy_1_2 or a stricter policy.

Policy details

Policy

tls_cipher_policy_1_0

tls_cipher_policy_1_1

tls_cipher_policy_1_2

tls_cipher_policy_1_2_strict

tls_cipher_policy_1_2_strict_with_1_3

TLS protocol versions

v1.0

Supported

Not supported

Not supported

Not supported

Not supported

v1.1

Supported

Supported

Not supported

Not supported

Not supported

v1.2

Supported

Supported

Supported

Supported

Supported

v1.3

Not supported

Not supported

Not supported

Not supported

Supported

Cipher suites

ECDHE-RSA-AES128-GCM-SHA256

Supported

Supported

Supported

Supported

Supported

ECDHE-RSA-AES256-GCM-SHA384

Supported

Supported

Supported

Supported

Supported

ECDHE-RSA-AES128-SHA256

Supported

Supported

Supported

Supported

Supported

ECDHE-RSA-AES256-SHA384

Supported

Supported

Supported

Supported

Supported

AES128-GCM-SHA256

Supported

Supported

Supported

Not supported

Not supported

AES256-GCM-SHA384

Supported

Supported

Supported

Not supported

Not supported

AES128-SHA256

Supported

Supported

Supported

Not supported

Not supported

AES256-SHA256

Supported

Supported

Supported

Not supported

Not supported

ECDHE-RSA-AES128-SHA

Supported

Supported

Supported

Supported

Supported

ECDHE-RSA-AES256-SHA

Supported

Supported

Supported

Supported

Supported

AES128-SHA

Supported

Supported

Supported

Not supported

Not supported

AES256-SHA

Supported

Supported

Supported

Not supported

Not supported

DES-CBC3-SHA

Supported

Supported

Supported

Not supported

Not supported

TLS_AES_256_GCM_SHA384

Not supported

Not supported

Not supported

Not supported

Supported

TLS_CHACHA20_POLY1305_SHA256

Not supported

Not supported

Not supported

Not supported

Supported

TLS_AES_128_CCM_SHA256

Not supported

Not supported

Not supported

Not supported

Supported

TLS_AES_128_CCM_8_SHA256

Not supported

Not supported

Not supported

Not supported

Supported

ECDHE-ECDSA-AES128-GCM-SHA256

Not supported

Not supported

Not supported

Not supported

Supported

ECDHE-ECDSA-AES256-GCM-SHA384

Not supported

Not supported

Not supported

Not supported

Supported

ECDHE-ECDSA-AES128-SHA256

Not supported

Not supported

Not supported

Not supported

Supported

ECDHE-ECDSA-AES256-SHA384

Not supported

Not supported

Not supported

Not supported

Supported

ECDHE-ECDSA-AES128-SHA

Not supported

Not supported

Not supported

Not supported

Supported

ECDHE-ECDSA-AES256-SHA

Not supported

Not supported

Not supported

Not supported

Supported

Configure a TLS security policy

Console

When you add an HTTPS listener, on the SSL Certificate tab, click Modify next to Advanced Settings. In the expanded section, select a TLS security policy.

To modify a TLS security policy, go to the Listener tab on the instance details page. Click the name of the target HTTPS listener to open the Listener Details dialog box. In the SSL Certificate section, modify the TLS security policy.

API

To create or modify an HTTPS listener via the API, call the CreateLoadBalancerHTTPSListener or SetLoadBalancerHTTPSListenerAttribute operation and specify the TLS security policy in the TLSCipherPolicy parameter.

Billing

TLS security policies are free of charge. You will incur fees for purchasing and using CLB instances.

FAQ

Does CLB support custom TLS security policies?

No. Currently, CLB only supports predefined TLS security policies.

If you need custom TLS security policies, consider using the following products:

Production environment

  • TLS protocol version: If your application has no special compatibility requirements, use TLS 1.2 and TLS 1.3 to ensure security.

  • Rollback: If an issue occurs after you adjust the TLS security policy, immediately roll back the change by modifying the listener configuration. Perform this change during off-peak hours.

  • Key exchange algorithm: If your application has no special compatibility requirements, avoid the following RSA-based key exchange cipher suites: AES128-GCM-SHA256, AES256-GCM-SHA384, AES128-SHA256, AES256-SHA256, AES128-SHA, AES256-SHA, and DES-CBC3-SHA. These suites do not support perfect forward secrecy (PFS) and are vulnerable to side-channel attacks. Prioritize cipher suites that include ECDHE or DHE key exchange.

TLS cipher suite mappings

This table maps the OpenSSL format, IANA standard format, and hexadecimal value for each cipher suite.

Mappings

OpenSSL format

IANA standard format

Hexadecimal

ECDHE-ECDSA-AES128-GCM-SHA256

TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256

0xC02B

ECDHE-ECDSA-AES256-GCM-SHA384

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

0xC02C

ECDHE-ECDSA-AES128-SHA256

TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256

0xC023

ECDHE-ECDSA-AES256-SHA384

TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384

0xC024

ECDHE-RSA-AES128-GCM-SHA256

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

0xC02F

ECDHE-RSA-AES256-GCM-SHA384

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

0xC030

ECDHE-RSA-AES128-SHA256

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

0xC027

ECDHE-RSA-AES256-SHA384

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

0xC028

AES128-GCM-SHA256

TLS_RSA_WITH_AES_128_GCM_SHA256

0x009C

AES256-GCM-SHA384

TLS_RSA_WITH_AES_256_GCM_SHA384

0x009D

AES128-SHA256

TLS_RSA_WITH_AES_128_CBC_SHA256

0x003C

AES256-SHA256

TLS_RSA_WITH_AES_256_CBC_SHA256

0x003D

ECDHE-ECDSA-AES128-SHA

TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA

0xC009

ECDHE-ECDSA-AES256-SHA

TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA

0xC00A

ECDHE-RSA-AES128-SHA

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

0xC013

ECDHE-RSA-AES256-SHA

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

0xC014

AES128-SHA

TLS_RSA_WITH_AES_128_CBC_SHA

0x002F

AES256-SHA

TLS_RSA_WITH_AES_256_CBC_SHA

0x0035

DES-CBC3-SHA

TLS_RSA_WITH_3DES_EDE_CBC_SHA

0x000A

TLS_AES_256_GCM_SHA384

TLS_AES_256_GCM_SHA384

0x1302

TLS_CHACHA20_POLY1305_SHA256

TLS_CHACHA20_POLY1305_SHA256

0x1303

TLS_AES_128_CCM_SHA256

TLS_AES_128_CCM_SHA256

0x1304

TLS_AES_128_CCM_8_SHA256

TLS_AES_128_CCM_8_SHA256

0x1305