<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable  TLS 1.0 - 1.2 on CISCO Firepower Management Center and FT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4566103#M1088017</link>
    <description>&lt;P&gt;yes, i'll do the change out of business hours&lt;/P&gt;&lt;P&gt;thanks for the tips&lt;/P&gt;</description>
    <pubDate>Tue, 08 Mar 2022 09:26:02 GMT</pubDate>
    <dc:creator>MaErre21325</dc:creator>
    <dc:date>2022-03-08T09:26:02Z</dc:date>
    <item>
      <title>Disable  TLS 1.0 - 1.1 on CISCO Firepower Management Center and FTD</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4565548#M1087993</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we need to disable tls 1.0 and 1.1 and move to tls 1.2, does this change impact all the active client to site vpn or the new parameter will be negotiated only for the new connections?&lt;/P&gt;&lt;P&gt;There will be downtime for this changing&amp;nbsp; or it is fully transparent to user?&lt;/P&gt;&lt;P&gt;Our anyconnect version is 4,10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 17:03:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4565548#M1087993</guid>
      <dc:creator>MaErre21325</dc:creator>
      <dc:date>2022-03-07T17:03:19Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.2 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4565553#M1087995</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1209925"&gt;@MaErre21325&lt;/a&gt; changing the TLS ciphers used on the FTD would impact the user connections. You change the FTD SSL/TLS setting using the Platform Settings. Guide &lt;A href="https://integratingit.wordpress.com/2021/01/28/secure-ftd-tls-ciphers/" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any TLS settings on the FMC is for connections to the management Web GUI, therefore has no bearing on the anyconnect clients connecting to the FTD.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 16:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4565553#M1087995</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-07T16:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.2 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4565567#M1087997</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now it's clear, thank you very much!&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 17:09:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4565567#M1087997</guid>
      <dc:creator>MaErre21325</dc:creator>
      <dc:date>2022-03-07T17:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.2 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4565570#M1087998</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1209925"&gt;@MaErre21325&lt;/a&gt; I forgot to mention, from memory I think making the changes ended the users session, forcing them to reconnect, so you may want to make the change during a out of hours.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You may also wish to confirm that the current connected sessions support and are currently connecting using DTLS 1.2, using the command "show vpn-sessiondb detail anyconnect | include Encapsulation"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&amp;gt; show vpn-sessiondb detail anyconnect | include Encapsulation&lt;BR /&gt;Encapsulation: TLSv1.2 TCP Src Port : 35205&lt;BR /&gt;Encapsulation: DTLSv1.2 UDP Src Port : 26702&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are changing the encryption, use "show vpn-sessiondb ratio encryption" to confirm what the current connections are using.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 17:17:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4565570#M1087998</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-07T17:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.2 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4566103#M1088017</link>
      <description>&lt;P&gt;yes, i'll do the change out of business hours&lt;/P&gt;&lt;P&gt;thanks for the tips&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 09:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4566103#M1088017</guid>
      <dc:creator>MaErre21325</dc:creator>
      <dc:date>2022-03-08T09:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.2 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4654034#M1092011</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;
&lt;P&gt;How do I achieve this using FDM? FTD is on 6.4.0.15&lt;/P&gt;
&lt;P&gt;Thanks always&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 16:16:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4654034#M1092011</guid>
      <dc:creator>engineer467</dc:creator>
      <dc:date>2022-07-20T16:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.2 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4654042#M1092012</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/157474"&gt;@engineer467&lt;/a&gt; to change the TLS ciphers in FDM for RAVPN, you'll need to upgrade to version 7.0.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/relnotes/firepower-release-notes-700/features.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/relnotes/firepower-release-notes-700/features.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 16:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4654042#M1092012</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-07-20T16:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.2 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4654045#M1092013</link>
      <description>&lt;P&gt;Appreciate it, Rob.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 16:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4654045#M1092013</guid>
      <dc:creator>engineer467</dc:creator>
      <dc:date>2022-07-20T16:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.1 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4853260#M1101517</link>
      <description>&lt;P&gt;I know this is an old post but was curious if there was a different area to disable support for TLSv1.0 and TLSv1.1 for the FMC GUI, I presume platform settings only applies to the FTD devices (443 and RAVPN)?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 20:19:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4853260#M1101517</guid>
      <dc:creator>mrlorincz</dc:creator>
      <dc:date>2023-06-12T20:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.1 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4853843#M1101540</link>
      <description>&lt;P&gt;Yes, platform settings are applied to the managed FTD. For FMC, I believe you will have to upgrade the FMC to the latest version in order to get TLS 1.2 and weak ciphers 1.0 or 1.1 should be disabled in that version.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 13:02:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4853843#M1101540</guid>
      <dc:creator>engineer467</dc:creator>
      <dc:date>2023-06-13T13:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.1 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4853933#M1101546</link>
      <description>&lt;P&gt;Thanks! That makes sense. I appreciate you responding.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 14:54:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4853933#M1101546</guid>
      <dc:creator>mrlorincz</dc:creator>
      <dc:date>2023-06-13T14:54:45Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.1 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4854354#M1101566</link>
      <description>&lt;P&gt;The FMC GUI, even on the soon-to-be-released 7.4 does not disable weak ciphers.&lt;/P&gt;
&lt;P&gt;See this thread and my reply dated 8 June for more details: &lt;A href="https://community.cisco.com/t5/network-security/tls-version-1-1-protocol-deprecated/m-p/4851435#M1101375" target="_blank"&gt;https://community.cisco.com/t5/network-security/tls-version-1-1-protocol-deprecated/m-p/4851435#M1101375&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 08:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4854354#M1101566</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-06-14T08:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.1 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4854707#M1101611</link>
      <description>&lt;P&gt;Thanks Marvin! Always nice to hear from a legend! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; That stinks about platform settings not affecting the mgmt interface's ciphers (being unable to disable TLSv1.0/TLSv1.1. I realized after my question that our security report didn't call out FMC as using TLSv1.0/TLSv1.2, I just ran an nmap scan and It seems it's only using TLSv1.2 (FMC7.0.5). At least that's some good news for me. Thanks for responding!&lt;/P&gt;&lt;P&gt;PORT STATE SERVICE VERSION&lt;BR /&gt;443/tcp open ssl/http Apache httpd&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.2:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| cipher preference: server&lt;BR /&gt;|_ least strength: A&lt;BR /&gt;|_http-server-header: Apache&lt;/P&gt;&lt;P&gt;NSE: Script Post-scanning.&lt;BR /&gt;Initiating NSE at 08:55&lt;BR /&gt;Completed NSE at 08:55, 0.00s elapsed&lt;BR /&gt;Initiating NSE at 08:55&lt;BR /&gt;Completed NSE at 08:55, 0.00s elapsed&lt;BR /&gt;Read data files from: C:\Program Files (x86)\Nmap&lt;BR /&gt;Service detection performed. Please report any incorrect results at &lt;A href="https://nmap.org/submit/" target="_blank"&gt;https://nmap.org/submit/&lt;/A&gt; .&lt;BR /&gt;Nmap done: 1 IP address (1 host up) scanned in 27.14 seconds&lt;BR /&gt;Raw packets sent: 5 (196B) | Rcvd: 2 (72B)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 15:59:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4854707#M1101611</guid>
      <dc:creator>mrlorincz</dc:creator>
      <dc:date>2023-06-14T15:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: Disable  TLS 1.0 - 1.1 on CISCO Firepower Management Center and FT</title>
      <link>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4854995#M1101627</link>
      <description>&lt;P&gt;Ah, they may have updated that with 7.0.5. I think the previous 7.0 version I checked still had weak ciphers in the offering.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 02:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-tls-1-0-1-1-on-cisco-firepower-management-center-and-ftd/m-p/4854995#M1101627</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-06-15T02:54:02Z</dc:date>
    </item>
  </channel>
</rss>

