<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable Weak Cipher in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disable-weak-cipher/m-p/3229888#M1010995</link>
    <description>Hi&lt;BR /&gt;&lt;BR /&gt;You can use ssl cipher command:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200150-Cisco-Guide-to-Harden-Cisco-ASA-Firewall.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200150-Cisco-Guide-to-Harden-Cisco-ASA-Firewall.html&lt;/A&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 11 Dec 2017 04:21:36 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2017-12-11T04:21:36Z</dc:date>
    <item>
      <title>Disable Weak Cipher</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher/m-p/3229877#M1010992</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Based on result penetratiion test i have to disable weak cipher on ASA cisco 5516.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SSL weak cipher &lt;BR /&gt;Recomend disable : TLS_RSA_WITH_3DES_EDE_CBC_SHA , TLS_RSA_WITH_RC4_128_MD5, TLS_RSA_WITH_RC4_128_SHA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;May i know the command to disable and the impact disable the SSL above.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:56:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher/m-p/3229877#M1010992</guid>
      <dc:creator>sahrizal123</dc:creator>
      <dc:date>2020-02-21T14:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: Disable Weak Cipher</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher/m-p/3229888#M1010995</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;You can use ssl cipher command:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200150-Cisco-Guide-to-Harden-Cisco-ASA-Firewall.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200150-Cisco-Guide-to-Harden-Cisco-ASA-Firewall.html&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Dec 2017 04:21:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher/m-p/3229888#M1010995</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-12-11T04:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: Disable Weak Cipher</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher/m-p/3229912#M1010997</link>
      <description>&lt;P&gt;I use the following commands (along the lines of what's explained in the link provided by Francesco):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ssl cipher default custom "ECDHE-ECDSA-AES256-SHA384;AES256-SHA;AES128-SHA256"
ssl cipher tlsv1 custom "ECDHE-ECDSA-AES256-SHA384;AES256-SHA;AES128-SHA256"
ssl cipher dtlsv1 custom "ECDHE-ECDSA-AES256-SHA384;AES256-SHA"&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that if you use ASDM your Java will need to have the JCE strong crypto libraries to be able to connect to the ASA following implementation of that hardening configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's about the only impact unless you have clients with VERY old browsers trying to use your SSL VPN portal on thee ASA. Any relatively modern browser (i.e. from the last 3-4 years onward) should connect with no issue.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2017 06:23:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher/m-p/3229912#M1010997</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-12-11T06:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: Disable Weak Cipher</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher/m-p/3230643#M1011000</link>
      <description>In addition to Francescos and Marvins input, I recently started for many customers to disable TLS1.0 and 1.1 completely. And for TLS1.2 I only allow the high security ciphers. That won't work in every environment, but with actual client-software there is no problem.</description>
      <pubDate>Tue, 12 Dec 2017 09:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher/m-p/3230643#M1011000</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-12-12T09:23:34Z</dc:date>
    </item>
  </channel>
</rss>

