<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It appears Cisco will release in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585167#M42483</link>
    <description>&lt;P&gt;It appears Cisco will release one more software version for the ACE30 &amp;amp; 4710 - A5(3.3) due late August. This will patch some more SSL vulnerabilities&lt;/P&gt;</description>
    <pubDate>Sat, 08 Aug 2015 06:49:34 GMT</pubDate>
    <dc:creator>TIM JUDGE</dc:creator>
    <dc:date>2015-08-08T06:49:34Z</dc:date>
    <item>
      <title>ACE30 (A5(3.1a)) SSL Parameter map</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585149#M42465</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;We have a requirement to disable SSLv3 support and enable TLS1.0, 1.1 and 1.2 within our environment. &amp;nbsp;Since having upgraded to A5(3.1a) we have available to us the ability to use TLS1.0, 1.1 and 1.2 according to the release notes, however in practice i've found that there is no ability to have only TLS1.0, 1.1 and 1.2, (not SSLv3)&amp;nbsp;applied to a given VIP (via the ssl-proxy commands). From testing i've found that if I want to be specific about the versions of TLS, only one can be applied at a time: &amp;nbsp;E.g.&lt;/P&gt;&lt;P&gt;parameter-map type ssl SSL-TLS1.0&lt;BR /&gt;&amp;nbsp; cipher RSA_WITH_3DES_EDE_CBC_SHA&lt;BR /&gt;&amp;nbsp; cipher RSA_WITH_AES_128_CBC_SHA priority 3&lt;BR /&gt;&amp;nbsp; cipher RSA_WITH_AES_256_CBC_SHA priority 2&lt;BR /&gt;&amp;nbsp; version TLS1&lt;/P&gt;&lt;P&gt;ssl-proxy service SSL-NISTEST&lt;BR /&gt;&amp;nbsp; key NISTEST-KEY.pem&lt;BR /&gt;&amp;nbsp; cert NISTEST-CRT-RENEWED.pem&lt;BR /&gt;&amp;nbsp; chaingroup SSL-AUSCERTS-SERVER-CHAIN&lt;BR /&gt;&amp;nbsp; ssl advanced-options SSL-TLS1.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cannot apply TLS1.0, 1.1 and 1.2, to therefore support all browsers etc. &amp;nbsp;I tried using "Up to TLS1.2" from the versions that were available, however this still includes SSLv3 which we do not want. &amp;nbsp;Can Cisco confirm that my observations are correct and that I cannot add all 3 versions of TLS? &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Sheldon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 11:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585149#M42465</guid>
      <dc:creator>sgonsalv</dc:creator>
      <dc:date>2014-10-16T11:52:54Z</dc:date>
    </item>
    <item>
      <title>Hi Sheldon,Please use "Upto</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585150#M42466</link>
      <description>&lt;P&gt;Hi Sheldon,&lt;/P&gt;&lt;P&gt;Please use "Upto_TLS1_2 " and do "no version ssl3", it takes it but unfortunately won't show in configuration and i haven't tested if it has any effect. Can you try this?&lt;/P&gt;&lt;P&gt;1/Admin(config-parammap-ssl)# no version ssl3&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;P&gt;Note: Please mark answers if they are helpful.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 13:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585150#M42466</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2014-10-16T13:23:22Z</dc:date>
    </item>
    <item>
      <title>Hi There,I tried that as well</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585151#M42467</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;I tried that as well though and it doesn't work unfortunately. &amp;nbsp;If you issue "Upto_TLS1.2" and then "no version SSL3", it removes any previous version configured altogether, i.e. it removes Upto_TLS1.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other ideas from CIsco personnel that see these posts?? &amp;nbsp;It would appear then that I can't just specify TLS1.0 +.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Sheldon&lt;/P&gt;</description>
      <pubDate>Sun, 19 Oct 2014 06:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585151#M42467</guid>
      <dc:creator>sgonsalv</dc:creator>
      <dc:date>2014-10-19T06:39:16Z</dc:date>
    </item>
    <item>
      <title>Hi Sheldon,You are right</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585152#M42468</link>
      <description>&lt;P&gt;Hi Sheldon,&lt;/P&gt;&lt;P&gt;You are right about the behavior and unfortunately there is not a way to achieve what you want. I see the similar requests internally here escalated to development. If there is any enhancement request around this and is decided to be implemented in next release, i will update here.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;P&gt;Note: Please mark answers if they are helpful&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2014 11:53:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585152#M42468</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2014-10-20T11:53:40Z</dc:date>
    </item>
    <item>
      <title>Hi Sheldon,An enhancement</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585153#M42469</link>
      <description>&lt;P&gt;Hi Sheldon,&lt;/P&gt;&lt;P&gt;An enhancement request has been opened already:&lt;/P&gt;&lt;P&gt;&lt;FONT style="FONT-SIZE: large"&gt;&lt;B&gt;&lt;A href="https://cdetsng.cisco.com/webui/#view=CSCur33237"&gt;CSCur33237&lt;/A&gt;&lt;/B&gt;&lt;/FONT&gt;&lt;A href="http://wwwin.cisco.com/ops/infra/pds/cbms/cdets/legend.shtml" target="_blank" title="Help"&gt;&lt;FONT size="1"&gt;&lt;IMG border="0" height="15" src="http://cdetsweb-prd.cisco.com/apps/files/xslt/help.png" width="15" /&gt;&lt;/FONT&gt;&lt;/A&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;FONT style="FONT-SIZE: large"&gt;&lt;B&gt;Need to allow all TLS versions but not SSLv3 in parameter-map&lt;/B&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT style="FONT-SIZE: large"&gt;&lt;B&gt;Once there is any ETA or update for it to implemented, i will post it here. &amp;nbsp;It is also better to open a TAC case. More the demand, more the chances of getting it implemented.&lt;/B&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT style="FONT-SIZE: large"&gt;&lt;B&gt;Regards,&lt;/B&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT style="FONT-SIZE: large"&gt;&lt;B&gt;Kanwal&lt;/B&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT style="FONT-SIZE: large"&gt;&lt;B&gt;Note: Please mark answers if they are helpful.&lt;/B&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2014 12:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585153#M42469</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2014-10-20T12:53:24Z</dc:date>
    </item>
    <item>
      <title>Thanks - i'll keep an eye on</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585154#M42470</link>
      <description>&lt;P&gt;Thanks - i'll keep an eye on this. &amp;nbsp;I actually logged a TAC case as well and learnt of the same.&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Sheldon&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2014 09:07:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585154#M42470</guid>
      <dc:creator>sgonsalv</dc:creator>
      <dc:date>2014-10-21T09:07:35Z</dc:date>
    </item>
    <item>
      <title>Hi,do anyone know if cisco</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585155#M42471</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;do anyone know if cisco implement a solution in near future.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kind regards,&lt;/P&gt;&lt;P&gt;Flo&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2014 07:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585155#M42471</guid>
      <dc:creator>Florian Holzapfel</dc:creator>
      <dc:date>2014-10-23T07:14:58Z</dc:date>
    </item>
    <item>
      <title>Hello Kanwal, just in case:</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585156#M42472</link>
      <description>&lt;P&gt;Hello Kanwal,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;just in case: in CSCur33237, will you also implement the possibility to configure multiple TLS versions but not all of them in a parameter map? For example someting like this:&lt;/P&gt;&lt;P&gt;parameter-map type ssl SSL-Config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; version TLS1_1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; version TLS1_2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; cipher ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;to only enable TLS 1.1 and 1.2, but NOT TLS 1.0?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards, Christian&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2014 07:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585156#M42472</guid>
      <dc:creator>interhyp1</dc:creator>
      <dc:date>2014-10-23T07:58:29Z</dc:date>
    </item>
    <item>
      <title>Hi Christian,I would suggest</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585157#M42473</link>
      <description>&lt;P&gt;Hi Christian,&lt;/P&gt;&lt;P&gt;I would suggest to open a TAC case and request for the same. Discussion is happening around excluding SSLV3 according to the DDTS and this new request might also be considered if there is a demand.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;P&gt;Note: Please mark answers if they are helpful.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2014 12:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585157#M42473</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2014-10-23T12:07:25Z</dc:date>
    </item>
    <item>
      <title>TAC case opened as well to</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585158#M42474</link>
      <description>&lt;P&gt;TAC case opened as well to push for the enhancement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fingers crossed.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2014 13:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585158#M42474</guid>
      <dc:creator>Adam Ingle</dc:creator>
      <dc:date>2014-10-24T13:15:21Z</dc:date>
    </item>
    <item>
      <title>Just to finish this thread</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585159#M42475</link>
      <description>&lt;P&gt;Just to finish this&amp;nbsp;thread off, Cisco released A5(3.1b) in late November 2014. This version disabled SSL3.0 so therefore when you use the command "Upto_TLS1.2" you enable TLS 1.0, TLS 1.1 &amp;amp; TLS 1,&amp;nbsp;that's all. Then just sort out a good set of ciphers and you're done.&lt;/P&gt;&lt;P&gt;An example of the config to use in your parameter map is below. This will have reasonable backward compatibility while adding support for TLS 1.1 &amp;amp; TLS 1.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;&amp;nbsp; cipher RSA_WITH_3DES_EDE_CBC_SHA priority 2&lt;/P&gt;&lt;P&gt;&amp;nbsp; cipher RSA_WITH_AES_128_CBC_SHA priority 3&lt;/P&gt;&lt;P&gt;&amp;nbsp; cipher RSA_WITH_AES_256_CBC_SHA priority 4&lt;/P&gt;&lt;P&gt;&amp;nbsp; cipher RSA_WITH_AES_128_CBC_SHA256 priority 5&lt;/P&gt;&lt;P&gt;&amp;nbsp; session-cache timeout 600&lt;/P&gt;&lt;P&gt;&amp;nbsp; version Upto_TLS1_2&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 02 Apr 2015 07:05:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585159#M42475</guid>
      <dc:creator>TIM JUDGE</dc:creator>
      <dc:date>2015-04-02T07:05:52Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,We are also facing the</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585160#M42476</link>
      <description>&lt;P&gt;Hi Tim,&lt;BR /&gt;&lt;BR /&gt;We are also facing the same issue. We have upgraded to A5(3.1b). We have configured the following on the Cisco ACE.&lt;BR /&gt;&lt;BR /&gt;Please find attached&amp;nbsp;the configs and # sh stats crypto client ouput done on the ACE.&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Even after the configs, SSLv3&amp;nbsp;authentication cache hits are found&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Request you to kindly review the config and suggest the necessary changes.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Regards,&lt;/DIV&gt;&lt;DIV&gt;Nithin&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2015 06:01:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585160#M42476</guid>
      <dc:creator>nijacob</dc:creator>
      <dc:date>2015-04-14T06:01:02Z</dc:date>
    </item>
    <item>
      <title>Hi Nithin,Your stats looks OK</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585161#M42477</link>
      <description>&lt;P&gt;Hi Nithin,&lt;/P&gt;&lt;P&gt;Your stats looks OK to me. Looks like it is all good. Why do you think you are still using SSL3?&lt;/P&gt;&lt;P&gt;Also, did you specifically not want to use the&amp;nbsp;TLS 1.1 and TLS 1.2?&lt;/P&gt;&lt;P&gt;Is there any reason you want to keep the MD5 cipher?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&lt;STRONG&gt;Cipher tlsv1_rsa_rc4_128_md5:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20&lt;/STRONG&gt;&lt;BR /&gt;Cipher tlsv1_rsa_rc4_128_sha:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&lt;STRONG&gt;Cipher tlsv1_rsa_des_cbc_sha:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 714&lt;BR /&gt;Cipher tlsv1_rsa_3des_ede_cbc_sha:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 410321&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;SSLv3 negotiated protocol:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&lt;STRONG&gt;TLSv1 negotiated protocol:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 411055&lt;/STRONG&gt;&lt;BR /&gt;SSLv3 full handshakes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;SSLv3 resumed handshakes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;SSLv3 rehandshakes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;SSLv3 secured rehandshakes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&lt;STRONG&gt;TLSv1 full handshakes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 411053&lt;/STRONG&gt;&lt;BR /&gt;TLSv1 resumed handshakes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;TLSv1 rehandshakes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;TLSv1 secured rehandshakes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;SSLv3 handshake failures:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;SSLv3 failures during data phase:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;TLSv1 handshake failures:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;BR /&gt;TLSv1 failures during data phase:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2015 09:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585161#M42477</guid>
      <dc:creator>TIM JUDGE</dc:creator>
      <dc:date>2015-04-14T09:03:07Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,Thanks a lot for your</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585162#M42478</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;Thanks a lot for your reply.&lt;BR /&gt;&lt;BR /&gt;In the parameter-map, we have given #no version ssl3 and given version TLS1.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In #sh stats crypto client, we are able to see the SSL authentication cache hits.&lt;/P&gt;&lt;P&gt;+-----------------------------------------------+&lt;BR /&gt;+--- Crypto client authentication statistics ---+&lt;BR /&gt;+-----------------------------------------------+&lt;BR /&gt;Total SSL client authentications: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0&lt;BR /&gt;Failed SSL client authentications: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;SSL authentication cache hits: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 415342&lt;BR /&gt;SSL static CRL lookups: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0&lt;BR /&gt;SSL best effort CRL lookups: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;SSL CRL lookup cache hits: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;SSL static OCSP lookups: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;SSL best effort OCSP lookups: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0&lt;BR /&gt;SSL OCSP lookup cache hits: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0&lt;BR /&gt;SSL revoked certificates: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0&lt;BR /&gt;Total SSL server authentications: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;415412&lt;BR /&gt;Failed SSL server authentications: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When checked on the browser, SSLv3 is still shown.&amp;nbsp;How to disable this completely and enable only TLSv1.&lt;/P&gt;&lt;P&gt;Request your valuable inputs on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Nithin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2015 09:03:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585162#M42478</guid>
      <dc:creator>nijacob</dc:creator>
      <dc:date>2015-04-14T09:03:32Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,Regarding the TLS1.1</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585163#M42479</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;Regarding the TLS1.1 and TLS1.2, there's no specific reason for that. We had just enabled only TLSv1.&lt;/P&gt;&lt;P&gt;Regarding the cipher, we had enabled only "RSA_WITH_3DES_EDE_CBC_SHA" in the parameter-map.&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Nithin.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2015 09:18:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585163#M42479</guid>
      <dc:creator>nijacob</dc:creator>
      <dc:date>2015-04-14T09:18:32Z</dc:date>
    </item>
    <item>
      <title>Hi Nithin, in response to the</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585164#M42480</link>
      <description>&lt;P&gt;Hi Nithin, in response to the SSL stats above, that represents SSL authentication, it is not referring to the protocol SSLv3. It can be misleading..Those cache hits are OK.&lt;/P&gt;&lt;P&gt;If you look at my post where I cut and pasted your stats, I bolded the protocols that were hit, none of them are SSLv3. If you are running A5(3.1b) SSLv3 is disabled&lt;/P&gt;&lt;P&gt;I recommend you try the settings I provided above. If your site is visible to the WWW then you can check its SSL status at various sites. One good one is the Qualys SSL server check here: &lt;A href="https://www.ssllabs.com/ssltest/index.html"&gt;https://www.ssllabs.com/ssltest/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Or you can try Wormly: &lt;A href="https://www.wormly.com/test_ssl"&gt;https://www.wormly.com/test_ssl&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Also, Cisco just released A5(3.2) last night which will be the final software release for the ACE line. It has quite a few security fixes and a few bug fixes.&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Apr 2015 06:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585164#M42480</guid>
      <dc:creator>TIM JUDGE</dc:creator>
      <dc:date>2015-04-18T06:21:19Z</dc:date>
    </item>
    <item>
      <title>Hi Nithin, personally I would</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585165#M42481</link>
      <description>&lt;P&gt;Hi Nithin, personally&amp;nbsp;I would recommend enabling TLS 1.1 &amp;amp; TLS 1.2 using the "version Upto_TLS1_2" option. The reason being that some people are disabling TLSv1.0 in their browsers (not me).&amp;nbsp;Add a few extra AES ciphers too if you can, I found the AES ciphers performed better in our environment. I just kept the 3DES cipher for compatibility with older browsers.&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;</description>
      <pubDate>Sat, 18 Apr 2015 06:28:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585165#M42481</guid>
      <dc:creator>TIM JUDGE</dc:creator>
      <dc:date>2015-04-18T06:28:39Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,Thanks a lot for your</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585166#M42482</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;Thanks a lot for your response. Appreciate it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Nithin.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2015 06:25:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585166#M42482</guid>
      <dc:creator>nijacob</dc:creator>
      <dc:date>2015-04-21T06:25:50Z</dc:date>
    </item>
    <item>
      <title>It appears Cisco will release</title>
      <link>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585167#M42483</link>
      <description>&lt;P&gt;It appears Cisco will release one more software version for the ACE30 &amp;amp; 4710 - A5(3.3) due late August. This will patch some more SSL vulnerabilities&lt;/P&gt;</description>
      <pubDate>Sat, 08 Aug 2015 06:49:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace30-a5-3-1a-ssl-parameter-map/m-p/2585167#M42483</guid>
      <dc:creator>TIM JUDGE</dc:creator>
      <dc:date>2015-08-08T06:49:34Z</dc:date>
    </item>
  </channel>
</rss>

