<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable weak cipher and TLS on CISCO  Firepower Management Center in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5018472#M1109168</link>
    <description>&lt;P&gt;I've tried to putty in and use expert mode to find and change the config file listed above.&amp;nbsp; Apparently on 7.2.5 they have moved the ciphers, and they don't appear in that file anymore.&amp;nbsp; So, I'm going to have to do some more digging when I get some time.&amp;nbsp; I'd like to point out though that anyone scanning their environment and eliminating weak ciphers has most likely already eliminated those ciphers from every computer that would be connecting to the device via the management interface anyway.&amp;nbsp; It's kind of dumb on Cisco's part to continue making these ciphers frustrating and difficult to change.&lt;/P&gt;</description>
    <pubDate>Wed, 14 Feb 2024 21:17:45 GMT</pubDate>
    <dc:creator>kpyle</dc:creator>
    <dc:date>2024-02-14T21:17:45Z</dc:date>
    <item>
      <title>Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4079053#M1069835</link>
      <description>&lt;P&gt;We are using CISCO Firepower Management Center for VMWare with software version 6.1.0.3 (build 57) and &amp;nbsp;Software Version 6.2.3.14 (build 41). During our VAPT assessment it’s been detected that this use weak cipher and TLS. I did login via web browser and went through the settings but not able to locate where to disable it. Could you please advice on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2020 15:34:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4079053#M1069835</guid>
      <dc:creator>Taro-AB81</dc:creator>
      <dc:date>2020-05-04T15:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4079152#M1069840</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;SSL/TLS settings are configured under Platform Settings, reference &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/platform_settings_for_firepower_threat_defense.html#id_46043" target="_self"&gt;here&lt;/A&gt;. You should probably consider upgrading 6.1 and 6.2 as they are very outdated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From FTD 6.6 allows you to configure DTLS 1.2 if using SSL/TLS VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2020 18:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4079152#M1069840</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-05-04T18:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4081677#M1069983</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the reply. But under platform i do not see a separate option for SSL settings. i have attached a screenshot. To be specific on the issue im facing, following is the vulnerability that been reported. (SSL Cipher Block Chaining Cipher Suites Supported - 443)&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 02:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4081677#M1069983</guid>
      <dc:creator>Taro-AB81</dc:creator>
      <dc:date>2020-05-08T02:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4082471#M1070035</link>
      <description>&lt;P&gt;The platform settings mentioned earlier apply to managed devices. You will see additional options for them on later releases of FMC.&lt;/P&gt;
&lt;P&gt;For FMC itself, you need to upgrade the version to get stronger cipher and TLS 1.2 support. FMC 6.5 disabled TLS 1.0 and 1.1. Here is a scan of an FMC 6.6 server:&lt;/P&gt;
&lt;PRE&gt;nmap -sV --script ssl-enum-ciphers -p 443 &amp;lt;host&amp;gt;&lt;BR /&gt;starting Nmap 7.80 ( https://nmap.org ) at 2020-05-09 19:48 Malay Peninsula Standard Time&lt;BR /&gt;Nmap scan report for fmc.ccielab.mrneteng.com (172.31.1.10)&lt;BR /&gt;Host is up (0.00s latency).&lt;BR /&gt;&lt;BR /&gt;PORT STATE SERVICE VERSION&lt;BR /&gt;443/tcp open ssl/http Apache httpd&lt;BR /&gt;|_http-server-header: Apache&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.2:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| cipher preference: server&lt;BR /&gt;| warnings:&lt;BR /&gt;| Key exchange (secp256r1) of lower strength than certificate key&lt;BR /&gt;|_ least strength: A&lt;BR /&gt;MAC Address: 00:0C:29:EF:2F:0F (VMware)&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2020 11:55:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4082471#M1070035</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-05-09T11:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4082526#M1070045</link>
      <description>Hi Marvin,&lt;BR /&gt;Thanks a lot for your reply. I will propose to upgrade to latest version. meanwhile do u think allowing only trusted IP connection via access list will secure the device?&lt;BR /&gt;As shown in my attachment earlier, currently it sets to any.</description>
      <pubDate>Sat, 09 May 2020 15:11:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4082526#M1070045</guid>
      <dc:creator>Taro-AB81</dc:creator>
      <dc:date>2020-05-09T15:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4082679#M1070053</link>
      <description>&lt;P&gt;Yes, restricting the management access to subnets where authorized management users are located can help - assuming this is consistent with your network operations model. It may require using a jumpbox for certain use cases - for instance if you want network admins to be able to access FMC when they are connected to the network via VPN and the VPN addresses are shared with non-admins.&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2020 02:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4082679#M1070053</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-05-10T02:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4545707#M1087085</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am currently running 7.0.1 on our FMC but I can not find any Information where to configure TLS cipher for the FMC it self.&lt;/P&gt;&lt;P&gt;Do you know where?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kind regards&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Fri, 04 Feb 2022 16:11:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4545707#M1087085</guid>
      <dc:creator>alex.f.</dc:creator>
      <dc:date>2022-02-04T16:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4546078#M1087089</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/909893"&gt;@alex.f.&lt;/a&gt; The FMC ciphersuite is not configurable. As I mentioned in my earlier post, upgrading to newer releases changes the ciphers used by FMC.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Feb 2022 12:15:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4546078#M1087089</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-02-05T12:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4565494#M1087990</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will enabling tls1.2 create some disruption on active client to site vpn via anyconnect or will the new parameter be taken at the new connection?&lt;BR /&gt;Should we expect a global disconnection or the new parameter is simply enabled for all new client to lan sessions?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;thanks&lt;BR /&gt;hello&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 15:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4565494#M1087990</guid>
      <dc:creator>MaErre21325</dc:creator>
      <dc:date>2022-03-07T15:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4565539#M1087991</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1209925"&gt;@MaErre21325&lt;/a&gt; TLS on the FMC has no bearing on a Client to Site VPN via anyconnect, the clients connect to the FTD.&lt;/P&gt;
&lt;P&gt;If you've got more questions create a new thread rather than potentially highjacking this thread.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 16:37:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4565539#M1087991</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-07T16:37:15Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4814581#M1099497</link>
      <description>&lt;P&gt;Updating this old thread, FMC still does not allow you to natively disable weak ciphers.&lt;/P&gt;
&lt;P&gt;I had a customer who requested I dig deeper to address an audit finding and found that FMC relies on the Apache web server and we can manage the configuration file it uses to restrict available ciphers. The file is /etc/httpd/httpsd.conf. It has a section as follows:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;SSLCipherSuite DHE-DSS-AES256-SHA:AES256-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES128-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384&lt;/LI-CODE&gt;
&lt;P&gt;I edited my lab FMC to make the following change:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;SSLCipherSuite DHE-DSS-AES256-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:DHE-DSS-AES128-SHA:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384&lt;/LI-CODE&gt;
&lt;P&gt;(removing the “insecure” ciphers). After making the change with vi (must be root user first), I restarted the FMC from clish using "system restart" and see that fewer ciphers are accepted, removing the ones their scanning service considers insecure.&lt;/P&gt;
&lt;P&gt;Scan before:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MarvinRhoads_0-1681486137459.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/181943iD6EBE5D07DBFD068/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MarvinRhoads_0-1681486137459.png" alt="MarvinRhoads_0-1681486137459.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Scan after:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MarvinRhoads_1-1681486137488.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/181944iC6BC7AE978BD2762/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MarvinRhoads_1-1681486137488.png" alt="MarvinRhoads_1-1681486137488.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Use at your own risk but it doesn't appear to break anything on my FMC 7.4.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; It may be necessary to reapply the fix after any upgrades.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 15:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/4814581#M1099497</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-04-14T15:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5015670#M1108964</link>
      <description>&lt;P&gt;I keep getting this result in Rapid7 scans which brought me to this feed.&amp;nbsp; I'm running the currently the recommended 7.2.5 version of FDM. One thing I am concerned about is that this is a security device which has the capability to inspect traffic including decrypting SSL/TLS with a known key.&amp;nbsp; Wouldn't removing the device's ability to decipher weak TLS also hamper its ability to inspect traffic and decrease the security provided by the device?&amp;nbsp; I would think the main concern is that weak cyphers aren't used to connect to the management interfaces of the device.&amp;nbsp; I'm considering testing this by limiting a computer to only using one of the weak cyphers and trying to connect via the management interface of the router.&amp;nbsp; If I can connect then maybe there is value in going through the steps above, if not then perhaps this is a false reading on the part of the scanner which is only looking at the fact that the weak cypher exists on the device and not how its used. I could be thinking about this all wrong.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 18:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5015670#M1108964</guid>
      <dc:creator>kpyle</dc:creator>
      <dc:date>2024-02-09T18:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5016332#M1109040</link>
      <description>&lt;P&gt;The instructions for disabling weak ciphers only affects traffic that is TO the device itself. It doesn't affect traffic THROUGH the device - including SSL decryption, inspection etc.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2024 03:13:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5016332#M1109040</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-02-12T03:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5018472#M1109168</link>
      <description>&lt;P&gt;I've tried to putty in and use expert mode to find and change the config file listed above.&amp;nbsp; Apparently on 7.2.5 they have moved the ciphers, and they don't appear in that file anymore.&amp;nbsp; So, I'm going to have to do some more digging when I get some time.&amp;nbsp; I'd like to point out though that anyone scanning their environment and eliminating weak ciphers has most likely already eliminated those ciphers from every computer that would be connecting to the device via the management interface anyway.&amp;nbsp; It's kind of dumb on Cisco's part to continue making these ciphers frustrating and difficult to change.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 21:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5018472#M1109168</guid>
      <dc:creator>kpyle</dc:creator>
      <dc:date>2024-02-14T21:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5018912#M1109178</link>
      <description>&lt;P&gt;The SSLCipherSuite section is still in my FMC 7.4.1 httpsd.conf file.&lt;/P&gt;
&lt;P&gt;They keep the older cipher compatibility in place to give the greatest client compatibility. Any modern client will negotiation a mutually acceptable strong cipher. I have not had any issues disabling the old ones to make my clients'&lt;/P&gt;
&lt;P&gt;auditors happy though.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2024 16:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5018912#M1109178</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-02-15T16:39:00Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5199496#M1116100</link>
      <description>&lt;P&gt;Sorry for necroing an old thread, but you seem very capable with this specific issue. Our router is failing an ASV compliance scan because it says that the&amp;nbsp;&lt;SPAN&gt;ECDHE-RSA-AES256-SHA384 cipher is enabled on the port we use for SSL VPN, but in the SSL Settings in FDM I have a custom cipher suite that is only utilizing&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;AES256-GCM-SHA384,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;DHE-RSA-AES256-GCM-SHA384,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;ECDHE-ECDSA-AES256-GCM-SHA384,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;ECDHE-ECDSA-AES256-SHA384, and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;ECDHE-RSA-AES256-GCM-SHA384. You mentioning the httpsd.conf file for the Apache server that would run on the SSL VPN port for people to download AnyConnect from makes me thinking that there is where the problem lies. Do you think that may be the issue? And if so, how to a navigate to that file when connected to the CLI of the router so I can edit the httpsd.conf file? Am I able to get to it through the normal CLI, or do I need to use the SYSTEM SUPPORT DIAGNOSTIC-CLI method?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 15:22:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5199496#M1116100</guid>
      <dc:creator>CDS LLC</dc:creator>
      <dc:date>2024-09-26T15:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5199534#M1116103</link>
      <description>&lt;P&gt;The http.conf information I mentioned earlier was specific to FMC and its web UI.&lt;/P&gt;
&lt;P&gt;If your FDM-managed FTD has a custom cipher suite for SSL VPN that should suffice for it's interface with VPN enabled.Is it that interface address that is being scanned?&lt;/P&gt;
&lt;P&gt;However, if you have any static NAT for a web server as scan might also pickup the web server's settings so be sure to check for that.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 16:35:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5199534#M1116103</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-09-26T16:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5272541#M1120107</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"If we are using only FDM and not FMC, how can we disable SSL CBC ciphers? Also, do we need any licenses to proceed with this configuration?"&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2025 14:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5272541#M1120107</guid>
      <dc:creator>minhn</dc:creator>
      <dc:date>2025-03-18T14:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5302609#M1121467</link>
      <description>&lt;P&gt;I'm in the same place again unfortunately. You were right: it looks like the HTTPS web server that runs on our SSL VPN port to provide the Cisco AnyConnect package to users has a separate set of SSL Ciphers, of which include the less secure CBC ciphers that my PCI DSS scanning vendor is flagging me for. I researched for a WHILE and found a way to edit the SSL settings for the HTTPS server using the FXOS cli, but when I went to commit my changes to the buffer it errored out. Turns out you're not allowed to use FXOS configuration commands in the CLI if you're not using a Cisco 4300 or 9100 series router, which in my opinion is INSANE. The "connect ftd" cli has no way of editing these same settings, which is unfortunate. Am I just SOL?&lt;BR /&gt;&lt;BR /&gt;It's OK if I am, I'd just like to know so I can stop wasting time on it and try to negotiate something with my scanning vendor. Thanks for always being helpful.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 20:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5302609#M1121467</guid>
      <dc:creator>CDS LLC</dc:creator>
      <dc:date>2025-06-25T20:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: Disable weak cipher and TLS on CISCO  Firepower Management Center</title>
      <link>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5304460#M1121560</link>
      <description>&lt;P&gt;SSL VPN ciphers are controlled under device platform settings in FMC, not within FXOS (cli) or FCM (GUI for chassis only).&lt;/P&gt;
&lt;P&gt;Here's a good blog post walking you through the steps:&amp;nbsp;&lt;A href="https://integratingit.wordpress.com/2021/01/28/secure-ftd-tls-ciphers/" target="_blank"&gt;https://integratingit.wordpress.com/2021/01/28/secure-ftd-tls-ciphers/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 15:55:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-weak-cipher-and-tls-on-cisco-firepower-management-center/m-p/5304460#M1121560</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-07-01T15:55:33Z</dc:date>
    </item>
  </channel>
</rss>

