<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disabling TLS v1.1 at sw - (2) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4781445#M1098118</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;you are right. One question: the vulnerability issue in this case is due to TLS lower version 1.0 and 1.1. If the lower version of TLS is still &lt;STRONG&gt;enabled&lt;/STRONG&gt;, but http and https are &lt;STRONG&gt;disabled&lt;/STRONG&gt;, does this vulnerability issue still exist theoretically ?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Feb 2023 14:48:20 GMT</pubDate>
    <dc:creator>Leftz</dc:creator>
    <dc:date>2023-02-23T14:48:20Z</dc:date>
    <item>
      <title>Disabling TLS v1.1 at sw - (2)</title>
      <link>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4778653#M1098006</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;This post is following the below link. The question is after changing TLS version, the security vulnerability report is same as before, meaning the change did not remediate the issue. Even if the http and https were disabled, the issue is still existing. The report message is posted as below. Anyone has some suggestions? Thank you very much.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/disabling-tls-v1-1-at-sw/td-p/4774454" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/disabling-tls-v1-1-at-sw/td-p/4774454&lt;/A&gt;&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------&lt;/P&gt;&lt;P&gt;172.16.10.10&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ubuntu/Linux&amp;nbsp;&amp;nbsp;&amp;nbsp; host scanned, found vuln&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 38794&amp;nbsp;&amp;nbsp;&amp;nbsp; Secure Sockets Layer/Transport Layer Security (SSL/TLS) Server Supports Transport Layer Security (TLSv1.1)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Active&amp;nbsp;&amp;nbsp; Vuln&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; over ssl 44770.46245&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 44920.88127&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 29&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Deprecating TLS 1.0 and TLS 1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2 (E:U/RL:U/RC:C)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Asset Group: Network Devices - US Network Devices - Austin, Collateral Damage Potential:&amp;nbsp; None, Target Distribution: None, Confidentiality Requirement: , Integrity Requirement: , Availability Requirement:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.4 (E:U/RL:U/RC:C)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "Disable the use of TLSv1.1 protocol in favor of a cryptographically stronger protocol such as TLSv1.2.&lt;/P&gt;&lt;P&gt;The following openssl commands can be used to do a manual test:&lt;/P&gt;&lt;P&gt;openssl s_client -connect ip:port -tls1_1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the test is successful, then the target support TLSv1.1"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TLSv1.1 is supported#&amp;nbsp;&amp;nbsp;&amp;nbsp; no&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; General remote services&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 338&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 16:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4778653#M1098006</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2023-02-20T16:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling TLS v1.1 at sw - (2)</title>
      <link>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4778694#M1098015</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; if you http and https is disabled and you run openssl to test, then you should get &lt;STRONG&gt;Connection refused.&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE&gt;rob@ubuntu-1:~$ openssl s_client -connect 192.168.10.2:443 -tls1_2&lt;BR /&gt;140579900519744:error:0200206F:system library:connect:&lt;STRONG&gt;Connection refused&lt;/STRONG&gt;:../crypto/bio/b_sock2.c:110:&lt;BR /&gt;140579900519744:error:2008A067:BIO routines:BIO_connect:connect error:../crypto/bio/b_sock2.c:111:&lt;BR /&gt;connect:errno=111&lt;BR /&gt;&lt;BR /&gt;rob@ubuntu-1:~$ openssl s_client -connect 192.168.10.2:443 -tls1_1&lt;BR /&gt;139857395860800:error:0200206F:system library:connect:&lt;STRONG&gt;Connection refused&lt;/STRONG&gt;:../crypto/bio/b_sock2.c:110:&lt;BR /&gt;139857395860800:error:2008A067:BIO routines:BIO_connect:connect error:../crypto/bio/b_sock2.c:111:&lt;BR /&gt;connect:errno=111&lt;/PRE&gt;
&lt;P&gt;Can you confirm http is definately disabled&lt;/P&gt;
&lt;PRE&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;/PRE&gt;
&lt;P&gt;Run "show run | inc tls" and confirm only TLS 1.2 is configured.&lt;/P&gt;
&lt;P&gt;C3850(config)#do show run | inc tls&lt;BR /&gt;&lt;STRONG&gt;ip http tls-version TLSv1.2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You can confirm what the TLS version the switch configured to use using NMAP, as below&lt;/P&gt;
&lt;PRE&gt;rob@ubuntu-1:~$ &lt;STRONG&gt;&lt;EM&gt;nmap -sV --script ssl-enum-ciphers -p 443 &amp;lt;ip address&amp;gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;Starting Nmap 7.80 ( https://nmap.org ) at 2023-02-20 17:26 UTC&lt;BR /&gt;Nmap scan report for 192.168.10.2&lt;BR /&gt;Host is up (0.0032s latency).&lt;BR /&gt;&lt;BR /&gt;PORT STATE SERVICE VERSION&lt;BR /&gt;443/tcp open ssl/http nginx&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;&lt;STRONG&gt;| TLSv1.2:&lt;/STRONG&gt;&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| cipher preference: server&lt;BR /&gt;| warnings:&lt;BR /&gt;| Weak certificate signature: SHA1&lt;BR /&gt;|_ least strength: A&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 17:50:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4778694#M1098015</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-20T17:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling TLS v1.1 at sw - (2)</title>
      <link>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4779802#M1098069</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Thank you very much for your reply.&lt;/P&gt;&lt;P&gt;command "openssl s_client -connect 192.168.10.2:443 -tls1_2" can not be run at router or switch. we are going to add Linux to run it.&amp;nbsp; Is there a similar cisco command to run for this purpose?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can only run the below two commands at this moment.&amp;nbsp;&lt;/P&gt;&lt;P&gt;ESW#&lt;STRONG&gt;show run | in tls&lt;/STRONG&gt;&lt;BR /&gt;ip http tls-version TLSv1.2&lt;BR /&gt;ip http client tls-version TLSv1.2&lt;BR /&gt;&lt;BR /&gt;ESW#&lt;STRONG&gt;sh run | in http&lt;/STRONG&gt;&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip http tls-version TLSv1.2&lt;BR /&gt;ip http client tls-version TLSv1.2&lt;BR /&gt;destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 17:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4779802#M1098069</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2023-02-21T17:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling TLS v1.1 at sw - (2)</title>
      <link>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4779870#M1098072</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; no i do not believe there is a cisco command.&lt;/P&gt;
&lt;P&gt;The configuration certainly seems to confirm neither http/https is enabled and only TLS1.2 is configured, this mirrored my switch when I run the above tests to replicate your scenario.&lt;/P&gt;
&lt;P&gt;You can run both openssl and nmap on windows if you don't have linux to run your own tests. Then get your vulnerability scanner to re-run the test again.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 19:53:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4779870#M1098072</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-21T19:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling TLS v1.1 at sw - (2)</title>
      <link>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4780644#M1098086</link>
      <description>&lt;P&gt;Run command show ip socket on this sw. but looks like it cannot show something useful. because I cannot find some difference between before and after closing 80 or 443 by command no ip http server or no ip http secure-server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ESW#show ip sockets&lt;BR /&gt;Proto Remote Port Local Port In Out Stat TTY OutputIF&lt;BR /&gt;17 0.0.0.0 0 172.16.10.10 2228 0 0 211 0&lt;BR /&gt;17 10.1.9.43 55775 172.16.10.10 161 0 0 2001001 0&lt;BR /&gt;17 --listen-- 172.16.10.10 162 0 0 2001011 0&lt;BR /&gt;17 --listen-- 172.16.10.10 52585 0 0 2001011 0&lt;BR /&gt;17(v6) --listen-- --any-- 161 0 0 2020001 0&lt;BR /&gt;17(v6) --listen-- --any-- 162 0 0 2020011 0&lt;BR /&gt;17(v6) --listen-- --any-- 52448 0 0 2020001 0&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2023 15:13:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4780644#M1098086</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2023-02-22T15:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling TLS v1.1 at sw - (2)</title>
      <link>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4781445#M1098118</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;you are right. One question: the vulnerability issue in this case is due to TLS lower version 1.0 and 1.1. If the lower version of TLS is still &lt;STRONG&gt;enabled&lt;/STRONG&gt;, but http and https are &lt;STRONG&gt;disabled&lt;/STRONG&gt;, does this vulnerability issue still exist theoretically ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2023 14:48:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4781445#M1098118</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2023-02-23T14:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling TLS v1.1 at sw - (2)</title>
      <link>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4781500#M1098121</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; if disabled, I'd say the device will not be exploitable&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2023 16:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4781500#M1098121</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-23T16:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling TLS v1.1 at sw - (2)</title>
      <link>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4782286#M1098152</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 20:45:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-tls-v1-1-at-sw-2/m-p/4782286#M1098152</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2023-02-24T20:45:27Z</dc:date>
    </item>
  </channel>
</rss>

