<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable SSL Block Chaining on Firepower for Client Remote Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disable-ssl-block-chaining-on-firepower-for-client-remote-access/m-p/5221670#M1117421</link>
    <description>&lt;P&gt;Check this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2021/01/28/secure-ftd-tls-ciphers/" target="_blank"&gt;https://integratingit.wordpress.com/2021/01/28/secure-ftd-tls-ciphers/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Thu, 07 Nov 2024 19:01:19 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-11-07T19:01:19Z</dc:date>
    <item>
      <title>Disable SSL Block Chaining on Firepower for Client Remote Access</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssl-block-chaining-on-firepower-for-client-remote-access/m-p/5221613#M1117415</link>
      <description>&lt;P&gt;Hi, my company uses a Cisco 4115 FTD version 7.2.7 to provide remote access for company employees. Cisco Secure Client and Cisco ISE are used as part of this solution. In a recent penetration test, the auditors advised that we disable cipher suites that operate in CBC mode on these devices. The reason they gave is that these cipher suites have the potential to leak information if used improperly.&lt;BR /&gt;We manage these devices through an FMC running 7.4.1.1. I have tried to determine how I can disable these suites but to no avail. Can anyone advise how to do this and also, whether it is a valid concern on behalf of the auditor?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 16:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssl-block-chaining-on-firepower-for-client-remote-access/m-p/5221613#M1117415</guid>
      <dc:creator>macloughs</dc:creator>
      <dc:date>2024-11-07T16:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSL Block Chaining on Firepower for Client Remote Access</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssl-block-chaining-on-firepower-for-client-remote-access/m-p/5221670#M1117421</link>
      <description>&lt;P&gt;Check this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2021/01/28/secure-ftd-tls-ciphers/" target="_blank"&gt;https://integratingit.wordpress.com/2021/01/28/secure-ftd-tls-ciphers/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 19:01:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssl-block-chaining-on-firepower-for-client-remote-access/m-p/5221670#M1117421</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-07T19:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSL Block Chaining on Firepower for Client Remote Access</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssl-block-chaining-on-firepower-for-client-remote-access/m-p/5221808#M1117428</link>
      <description>&lt;P&gt;The procedure is also covered in this community thread:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn/anyconnect-perfect-forward-secrecy/td-p/3324415" target="_blank"&gt;https://community.cisco.com/t5/vpn/anyconnect-perfect-forward-secrecy/td-p/3324415&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;FYI you should also upgrade to 7.2.9 or 7.4.2.1 to address other recent security vulnerabilities announced by Cisco.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 04:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssl-block-chaining-on-firepower-for-client-remote-access/m-p/5221808#M1117428</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-11-08T04:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSL Block Chaining on Firepower for Client Remote Access</title>
      <link>https://community.cisco.com/t5/network-security/disable-ssl-block-chaining-on-firepower-for-client-remote-access/m-p/5222602#M1117463</link>
      <description>&lt;P&gt;Thanks guys for the help. That was what I was looking for.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 09:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-ssl-block-chaining-on-firepower-for-client-remote-access/m-p/5222602#M1117463</guid>
      <dc:creator>macloughs</dc:creator>
      <dc:date>2024-11-11T09:59:11Z</dc:date>
    </item>
  </channel>
</rss>

