(SOL5437) Note: For more information, refer to SOL4423: Overview of UCS archivesandSOL8465: Viewing and extracting the contents of an encrypted UCS archive file.
The encryption implementation used to create user configuration set (UCS) files is based on the GNU Privacy Guard (GnuPG). Information about GnuPG is available at the following location:
www.gnupg.org
The BIG-IP system uses a 128-bit AES cipher for UCS file encryption.
UCS files are encrypted using a symmetric cipher as the encryption key. The sy
↧