<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Disable https on Firepower Threat Defense 2100 nodes? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4718013#M1094863</link>
    <description>&lt;P&gt;Security analysts told us that a network security scan shows that the HTTPS service may be running on the management interfaces our&amp;nbsp; FTD nodes.&amp;nbsp; Trying to access it via browser, it returned the following message:&lt;/P&gt;&lt;H1&gt;Service Unavailable&lt;/H1&gt;&lt;P&gt;The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later.&lt;/P&gt;&lt;P&gt;...when trying to access a secure webpage using &lt;A href="https://FQDN" target="_blank" rel="noopener"&gt;https://FQDN&lt;/A&gt; of the FTD 2130 (Firepower Threat Defense) nodes.&amp;nbsp; We have a 2-node cluster they scanned and it seems https service is enabled somewhere but I'm not sure how to disable it if it is enabled.&amp;nbsp; The browser tab message shows "503 service unavailable", so I'm not even sure it's actually enabled.&amp;nbsp; Can anyone confirm?&amp;nbsp; Can this be disabled using the FMC or must this be done in the FTD CLI?&amp;nbsp; If so, how?&amp;nbsp; Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Tue, 08 Nov 2022 16:10:09 GMT</pubDate>
    <dc:creator>andrewjinks</dc:creator>
    <dc:date>2022-11-08T16:10:09Z</dc:date>
    <item>
      <title>Disable https on Firepower Threat Defense 2100 nodes?</title>
      <link>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4718013#M1094863</link>
      <description>&lt;P&gt;Security analysts told us that a network security scan shows that the HTTPS service may be running on the management interfaces our&amp;nbsp; FTD nodes.&amp;nbsp; Trying to access it via browser, it returned the following message:&lt;/P&gt;&lt;H1&gt;Service Unavailable&lt;/H1&gt;&lt;P&gt;The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later.&lt;/P&gt;&lt;P&gt;...when trying to access a secure webpage using &lt;A href="https://FQDN" target="_blank" rel="noopener"&gt;https://FQDN&lt;/A&gt; of the FTD 2130 (Firepower Threat Defense) nodes.&amp;nbsp; We have a 2-node cluster they scanned and it seems https service is enabled somewhere but I'm not sure how to disable it if it is enabled.&amp;nbsp; The browser tab message shows "503 service unavailable", so I'm not even sure it's actually enabled.&amp;nbsp; Can anyone confirm?&amp;nbsp; Can this be disabled using the FMC or must this be done in the FTD CLI?&amp;nbsp; If so, how?&amp;nbsp; Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 16:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4718013#M1094863</guid>
      <dc:creator>andrewjinks</dc:creator>
      <dc:date>2022-11-08T16:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: Disable https on Firepower Threat Defense 2100 nodes?</title>
      <link>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4723113#M1095115</link>
      <description>&lt;P&gt;Hi Andrewjinks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you are using FMC to Manage FTD. Then you cannot access FTD via GUI using Management IP. &amp;nbsp;FTD device Management settings you can configure in FMC by navigating to&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FMC --&amp;gt; Device --&amp;gt; Platform settings&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now you can disable HTTP Access for FTD by navigating through &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FMC --&amp;gt; Device --&amp;gt; Platform settings --&amp;gt; HTTP Access and uncheck Enable HTTP Server check box&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://lithium-response-prod.s3.us-west-2.amazonaws.com/cisco.response.lithium.com/RESPONSEIMAGE/db428c96-2e47-4804-8cdd-6a254c282547.default.png" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://lithium-response-prod.s3.us-west-2.amazonaws.com/cisco.response.lithium.com/RESPONSEIMAGE/3cd061ed-e38d-4dae-a3cc-c6be8d4aa243.default.png" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly apply the above steps and let us know if you have more queries&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;-----------------------------------------&lt;BR /&gt;If you find my reply solved your question or issue, kindly click the 'Accept as Solution' button and vote it as helpful.&lt;/P&gt;&lt;P&gt;You can also learn more about Secure Firewall (formerly known as NGFW) through our live Ask the Experts (ATXs) session. Check out Cisco Network Security ATXs Resources [&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-network-security-ask-the-experts-resources/ta-p/4416493&lt;/A&gt;] to view the latest schedule for upcoming sessions, as well as the useful references, e.g. online guides, FAQs.&lt;BR /&gt;-----------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Arunkumar&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 10:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4723113#M1095115</guid>
      <dc:creator>Arunkumar Sathasivam</dc:creator>
      <dc:date>2022-11-17T10:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: Disable https on Firepower Threat Defense 2100 nodes?</title>
      <link>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4723158#M1095117</link>
      <description>&lt;P&gt;Unfortunately the service cannot be disabled, even when following the steps suggest by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1070623"&gt;@Arunkumar Sathasivam&lt;/a&gt; .&lt;/P&gt;
&lt;P&gt;There is an unresolved ENH bug (enhancement request) pending against this behavior.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz41482" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz41482&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 12:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4723158#M1095117</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-11-17T12:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Disable https on Firepower Threat Defense 2100 nodes?</title>
      <link>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4955092#M1105648</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1070623"&gt;@Arunkumar Sathasivam&lt;/a&gt;was this ever resolved?&amp;nbsp; It seems to have been a bug as the other user pointed out.&amp;nbsp; The HTTP option is disabled (unchecked) for the FTD nodes in the Device Management settings as described, but the 503 message still appears when you try to access the management interface of the nodes.&amp;nbsp; Our security scans are picking it up and we'll either need to disable it completely somehow, or apply a SSL/TLS certificate.&amp;nbsp; I don't see how to add a certificate for that interface, either, and I imagine that is because when using the FMC to manage the nodes, HTTP/S is supposed to be disabled on the nodes since the FMC is using HTTPS and there's a certificate for that.&lt;/P&gt;&lt;P&gt;Is there a way to apply a cert or disable HTTP/S completely via CLI or through FMC?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 17:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4955092#M1105648</guid>
      <dc:creator>andrewjinks</dc:creator>
      <dc:date>2023-11-07T17:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: Disable https on Firepower Threat Defense 2100 nodes?</title>
      <link>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4955369#M1105661</link>
      <description>&lt;P&gt;I advise my customers to cite the vendor ENH defect as a response to any security scans. If you try to manually disable it under the covers, you will be potentially be making your system unusable.&lt;/P&gt;
&lt;P&gt;I have had some success at limiting the ciphers presented. Reference these threads:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn/how-to-disable-tls-v1-0-v1-1-on-ftd-using-the-fdm-or-cli/td-p/4841893" target="_blank"&gt;https://community.cisco.com/t5/vpn/how-to-disable-tls-v1-0-v1-1-on-ftd-using-the-fdm-or-cli/td-p/4841893&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/td-p/4079053" target="_blank"&gt;https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/td-p/4079053&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 05:38:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-https-on-firepower-threat-defense-2100-nodes/m-p/4955369#M1105661</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-11-08T05:38:18Z</dc:date>
    </item>
  </channel>
</rss>

