<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to disable Accept connections using TLSv1 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5051698#M1110456</link>
    <description>&lt;P&gt;I will check this case tonight&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Update you&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Wed, 27 Mar 2024 19:55:52 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-03-27T19:55:52Z</dc:date>
    <item>
      <title>how to disable Accept connections using TLSv1</title>
      <link>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048413#M1110277</link>
      <description>&lt;P&gt;I need to disable the TLSv1.1 on ASA FDM 5516x and i have already disable the TLSv1.0 &amp;amp; 1.1 from&amp;nbsp;SSL Settings via GUI &amp;amp; then according to the below showing command results i still can see TLSv1.1 still active&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show ssl&lt;BR /&gt;Accept connections using SSLv3 or greater and negotiate to TLSv1.2 or greater&lt;BR /&gt;&lt;STRONG&gt;Start connections using TLSv1 and negotiate to TLSv1 or greater&lt;/STRONG&gt;&lt;BR /&gt;SSL DH Group: group14 (2048-bit modulus, FIPS)&lt;BR /&gt;SSL ECDH Group: group19 (256-bit EC)&lt;/P&gt;&lt;P&gt;SSL trust-points:&lt;BR /&gt;Self-signed (RSA 2048 bits RSA-SHA256) certificate available&lt;BR /&gt;Self-signed (EC 256 bits ecdsa-with-SHA256) certificate available&lt;BR /&gt;Certificate authentication is not enabled&lt;BR /&gt;&amp;gt; show running-config ssl&lt;BR /&gt;ssl server-version tlsv1.2&lt;BR /&gt;ssl cipher tlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES256-GCM-SHA384,DHE-RSA-AES256-GCM-SHA384"&lt;BR /&gt;&amp;gt; show running-config all ssl&lt;BR /&gt;ssl server-version tlsv1.2&lt;BR /&gt;ssl client-version tlsv1&lt;BR /&gt;ssl cipher default medium&lt;BR /&gt;ssl cipher tlsv1 medium&lt;BR /&gt;ssl cipher tlsv1.1 medium&lt;BR /&gt;ssl cipher tlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES256-GCM-SHA384,DHE-RSA-AES256-GCM-SHA384"&lt;BR /&gt;ssl cipher dtlsv1 medium&lt;BR /&gt;ssl dh-group group14&lt;BR /&gt;ssl ecdh-group group19&lt;BR /&gt;ssl certificate-authentication fca-timeout 2&amp;gt; show ssl&amp;gt; show running-config ssl&amp;gt; show running-config all ssl&lt;/P&gt;&lt;P&gt;&amp;gt; show version&lt;BR /&gt;---------------[ EGCAI01-Firepower ]----------------&lt;BR /&gt;Model : Cisco ASA5516-X Threat Defense (75) Version 7.0.1 (Build 84)&lt;BR /&gt;UUID : 8b6ebab4-5347-11eb-b351-b67ba7c78576&lt;BR /&gt;Rules update version : 2023-10-25-001-vrt&lt;BR /&gt;VDB version : 353&lt;BR /&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also enable the SSL encryption &amp;amp;&amp;nbsp;Block_SSL3.0_and_TLS1.0_and_TLS1.1 as per below :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_0-1711117411488.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/213625i21F35E6DBAAEB39F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_0-1711117411488.png" alt="amralrazzaz_0-1711117411488.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_1-1711117499208.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/213626i18F92E9375916079/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_1-1711117499208.png" alt="amralrazzaz_1-1711117499208.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also still showing TLSv1.1 enabled on the PRTG server ! so how can i disable TLSv1.1 totally from the fdm !?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 14:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048413#M1110277</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-03-22T14:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: how to disable Accept connections using TLSv1</title>
      <link>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048453#M1110278</link>
      <description>&lt;P&gt;You can try to add "ssl client-version&amp;nbsp;tlsv1.2" with FlexConfig (FDM may not accept it though), although this doesn't make much sense on FTD. This command sets TLS version when device is a TLS client, but FTD doesn't support clientless WebVPN and hence doesn't initiate TLS connections from Lina code.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 15:04:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048453#M1110278</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-03-22T15:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: how to disable Accept connections using TLSv1</title>
      <link>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048513#M1110280</link>
      <description>&lt;P&gt;THANKS for your reply and i have tried flexconfig but below error coming&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="amralrazzaz_0-1711122132197.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/213639i65555407DC7956A3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="amralrazzaz_0-1711122132197.png" alt="amralrazzaz_0-1711122132197.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Also that mean i can ignore this one and will be be usable !? and no way to disable it !? or enable TLSv1.2 on client level ?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 15:43:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048513#M1110280</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-03-22T15:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: how to disable Accept connections using TLSv1</title>
      <link>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048516#M1110281</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/361173"&gt;@amralrazzaz&lt;/a&gt; I believe you can only set the TLS settings for Remote Access VPN connections, not the Web GUI - &lt;U&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-system.html#Cisco_Task_in_List_GUI.dita_80e542fa-4b68-4611-bdcc-c0dee2540488" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-system.html#Cisco_Task_in_List_GUI.dita_80e542fa-4b68-4611-bdcc-c0dee2540488&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;"The SSL cipher settings control which TLS versions and encryption cipher suites are allowed for TLS/SSL connections to the device. Specifically, these settings control the ciphers clients are allowed to use when establishing&lt;U&gt;&lt;STRONG&gt; remote access VPN connections"&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;An SSL decryption rule would be for traffic through the FTD not to itself.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 15:48:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048516#M1110281</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-22T15:48:22Z</dc:date>
    </item>
    <item>
      <title>Re: how to disable Accept connections using TLSv1</title>
      <link>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048532#M1110282</link>
      <description>&lt;P&gt;Now i got you and thanks for clarification.&lt;/P&gt;&lt;P&gt;So in my case with the above outputs from show SSL command s I'm safe !&amp;nbsp; &amp;amp; for the TLSv1.2 on the client level doesn't matter coz im not using remote access vpn connections for the users!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;btw S-RAS or site2site VPN already configured but i think that's not related to our case ! as im targeting the safe remote connection to the FTD GUI via website with stronge encryption methods and i have already change the SSL settings anyway to TLTv1.2 adn creating policy for the traffic goes through the FDM not to the FDM it self as you said &amp;amp; no more action i can do ? right ?&lt;/P&gt;&lt;P&gt;&amp;gt; show running-config ssl&lt;BR /&gt;ssl server-version tlsv1.2&lt;BR /&gt;ssl cipher tlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES256-GCM-SHA384,DHE-RSA-AES256-GCM-SHA384"&lt;BR /&gt;&amp;gt; show ssl&lt;BR /&gt;Accept connections using SSLv3 or greater and negotiate to TLSv1.2 or greater&lt;BR /&gt;Start connections using TLSv1 and negotiate to TLSv1 or greater&lt;BR /&gt;SSL DH Group: group14 (2048-bit modulus, FIPS)&lt;BR /&gt;SSL ECDH Group: group19 (256-bit EC)&lt;/P&gt;&lt;P&gt;SSL trust-points:&lt;BR /&gt;Self-signed (RSA 2048 bits RSA-SHA256) certificate available&lt;BR /&gt;Self-signed (EC 256 bits ecdsa-with-SHA256) certificate available&lt;BR /&gt;Certificate authentication is not enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 16:02:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048532#M1110282</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-03-22T16:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: how to disable Accept connections using TLSv1</title>
      <link>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048903#M1110285</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; can you check this too if it okay or i have to do something else? :&lt;/P&gt;&lt;P&gt;&amp;gt; show ssl-policy-config&lt;BR /&gt;============[ NGFW-Default-SSL-Policy ]=============&lt;/P&gt;&lt;P&gt;=================[ Default Action ]=================&lt;BR /&gt;Default Action : Do Not Decrypt&lt;/P&gt;&lt;P&gt;======[ Category: admin_category (Built-in) ]=======&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;=====[ Category: standard_category (Built-in) ]=====&lt;/P&gt;&lt;P&gt;-----&lt;STRONG&gt;--[ Block_SSL3.0_and_TLS1.0_and_TLS1.1 ]--&lt;/STRONG&gt;-----&lt;BR /&gt;State : Enabled&lt;BR /&gt;Action : Block&lt;BR /&gt;Source Networks : Source Services : Destination Networks&lt;BR /&gt;: Destination Services : URLs&lt;BR /&gt;Certificates : Subject DN : Issuer DN&lt;BR /&gt;: Versions : &lt;STRONG&gt;SSL v3.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;TLS v1.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;TLS v1.1&lt;/STRONG&gt;&lt;BR /&gt;Logging Configuration&lt;BR /&gt;DC : Yes&lt;BR /&gt;End : Yes&lt;BR /&gt;Syslog : AC58b5f59a-b6f3-11eb-b14a-572da8a7f4ea&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;=======[ Category: root_category (Built-in) ]=======&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;============[ Trusted CA Certificates ]=============&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;=============[ Undecryptable Actions ]==============&lt;BR /&gt;Unsupported Cipher Suite : Inherit Default Action&lt;BR /&gt;Unknown Cipher Suite : Inherit Default Action&lt;BR /&gt;Compressed Session : Inherit Default Action&lt;BR /&gt;Uncached Session ID : Inherit Default Action&lt;BR /&gt;SSLv2 Session : Inherit Default Action&lt;BR /&gt;Handshake Error : Inherit Default Action&lt;BR /&gt;Decryption Error : &lt;STRONG&gt;Block&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ALSO I CAN SEE STILL TLSv1.1 enabled on below ! or its just showing the available versions to be using if needed and its not enabled?!&lt;/P&gt;&lt;P&gt;&amp;gt; show ssl-protocol&lt;BR /&gt;&lt;STRONG&gt;The supported ssl protocols are TLSv1.1 TLSv1.2&lt;/STRONG&gt;&lt;BR /&gt;&amp;gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 19:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5048903#M1110285</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2024-03-22T19:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: how to disable Accept connections using TLSv1</title>
      <link>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5051698#M1110456</link>
      <description>&lt;P&gt;I will check this case tonight&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Update you&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 19:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-disable-accept-connections-using-tlsv1/m-p/5051698#M1110456</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-27T19:55:52Z</dc:date>
    </item>
  </channel>
</rss>

