<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940378#M150534</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can try using &lt;STRONG&gt;show &lt;/STRONG&gt;&lt;G class="gr_ gr_6 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="6" data-gr-id="6"&gt;ssl&lt;/G&gt;&lt;STRONG&gt; ciphers all &lt;/STRONG&gt;command on the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
    <pubDate>Wed, 24 Aug 2016 15:38:29 GMT</pubDate>
    <dc:creator>Aditya Ganjoo</dc:creator>
    <dc:date>2016-08-24T15:38:29Z</dc:date>
    <item>
      <title>Firewall &amp; ASDM communication</title>
      <link>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940375#M150531</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I wan to understand on which protocols/security standards does the ASA communicate with ASDM&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:10:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940375#M150531</guid>
      <dc:creator>amarnathtiwari</dc:creator>
      <dc:date>2019-03-12T08:10:13Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940376#M150532</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;The communication is over HTTPS. The ciphers that are allowed can be verified using "show run all ssl". I dont know how to verify which ciphers are actually used by ASDM.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 10:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940376#M150532</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2016-08-23T10:58:12Z</dc:date>
    </item>
    <item>
      <title>Hello Henrik,</title>
      <link>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940377#M150533</link>
      <description>&lt;P&gt;Hello Henrik,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I tried running the command but got blank output. I am using&amp;nbsp;Version 9.1(6)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please help if any Cisco document mentioned this.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2016 14:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940377#M150533</guid>
      <dc:creator>amarnathtiwari</dc:creator>
      <dc:date>2016-08-24T14:24:03Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940378#M150534</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can try using &lt;STRONG&gt;show &lt;/STRONG&gt;&lt;G class="gr_ gr_6 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="6" data-gr-id="6"&gt;ssl&lt;/G&gt;&lt;STRONG&gt; ciphers all &lt;/STRONG&gt;command on the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2016 15:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940378#M150534</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-08-24T15:38:29Z</dc:date>
    </item>
    <item>
      <title>The ciphers actually used are</title>
      <link>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940379#M150535</link>
      <description>&lt;P&gt;The ciphers actually used are negotiated dynamically between your ASA and your local Java installation on the host where ASDM is launched. (ASDM is a Java applet uses the Java libraries including the cryptographic bits.)&lt;/P&gt;
&lt;P&gt;They will negotiate the strongest mutually supported cipher.&lt;/P&gt;
&lt;P&gt;The command "show ssl ciphers all" will show what the ASA code on your appliance can support.&lt;/P&gt;
&lt;P&gt;Best practice is to restrict them using an "ssl cipher ..." command. For instance here is mine with only strong ciphers allowed:&lt;/P&gt;
&lt;PRE class="prettyprint" style="padding-left: 30px;"&gt;asa-5512# show run ssl&lt;BR /&gt;ssl cipher default custom "ECDHE-ECDSA-AES256-SHA384;AES256-SHA"&lt;BR /&gt;ssl cipher tlsv1 custom "ECDHE-ECDSA-AES256-SHA384;AES256-SHA"&lt;BR /&gt;ssl cipher dtlsv1 custom "ECDHE-ECDSA-AES256-SHA384;AES256-SHA"&lt;BR /&gt;ssl trust-point SSLVPN_TrustPoint outside&lt;/PRE&gt;
&lt;P&gt;If you capture the traffic while connecting to ASDM, you will se a "Client Hello" frame in which your client (ASDM/Java) provides to the server a list of the cipher suites it supports. The server (ASA) will pick the strongest one and reply with a "Change Cipher Spec" request directing the client to use the strongest mutually supported suite.&lt;/P&gt;
&lt;P&gt;Something like this (open images in new window to zoom):&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/client_hello.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/server_change_cipher_spec.png" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2016 18:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940379#M150535</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-08-24T18:30:42Z</dc:date>
    </item>
    <item>
      <title>Hello Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940380#M150536</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;I am using Cisco ASA 5520 with ver&amp;nbsp;9.1(6), when I run the command "sh run ssl" I get blank output. Seems ssl encryption is not configured on my firewall. But when I run "sh ssl" command I get below output&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am also not able to run "&lt;SPAN&gt;show ssl ciphers all" as its not executing. I can configure "ssl encryption" from global config mode.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So my question is do I need to configure SSL encryption in my firewall to more secure my communication bw ASA &amp;amp; ASDM or java applet negotiation is enough.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;NOD-ASA/pri/act# sh ssl&lt;BR /&gt;Accept connections using SSLv2, SSLv3 or TLSv1 and negotiate to TLSv1&lt;BR /&gt;Start connections using TLSv1 and negotiate to TLSv1&lt;BR /&gt;Enabled cipher order: rc4-sha1 dhe-aes128-sha1 dhe-aes256-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;Disabled ciphers: des-sha1 rc4-md5 null-sha1&lt;BR /&gt;No SSL trust-points configured&lt;BR /&gt;Certificate authentication is not enabled&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 08:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940380#M150536</guid>
      <dc:creator>amarnathtiwari</dc:creator>
      <dc:date>2016-08-25T08:59:06Z</dc:date>
    </item>
    <item>
      <title>I am using Cisco ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940381#M150537</link>
      <description>&lt;P&gt;I am using Cisco ASA 5520 with ver&amp;nbsp;9.1(6), when I run the command "sh run ssl" I get blank output. Seems ssl encryption is not configured on my firewall. But when I run "sh ssl" command I get below output&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am also not able to run "&lt;SPAN&gt;show ssl ciphers all" as its not executing. I can configure "ssl encryption" from global config mode.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So my question is do I need to configure SSL encryption in my firewall to more secure my communication bw ASA &amp;amp; ASDM or java applet negotiation is enough.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hello Aditya,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;NOD-ASA/pri/act# sh ssl&lt;BR /&gt;Accept connections using SSLv2, SSLv3 or TLSv1 and negotiate to TLSv1&lt;BR /&gt;Start connections using TLSv1 and negotiate to TLSv1&lt;BR /&gt;Enabled cipher order: rc4-sha1 dhe-aes128-sha1 dhe-aes256-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;Disabled ciphers: des-sha1 rc4-md5 null-sha1&lt;BR /&gt;No SSL trust-points configured&lt;BR /&gt;Certificate authentication is not enabled&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 08:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940381#M150537</guid>
      <dc:creator>amarnathtiwari</dc:creator>
      <dc:date>2016-08-25T08:59:38Z</dc:date>
    </item>
    <item>
      <title>The command "show run ssl"</title>
      <link>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940382#M150538</link>
      <description>&lt;P&gt;The command "show run ssl" coming back with no output just means you have't specifically restricted your list to use anything other than the default.&lt;/P&gt;
&lt;P&gt;The command "show ssl ciphers all" was introduced in ASA 9.3(2) which is why you can't use it.&lt;/P&gt;
&lt;P&gt;The fact that "show ssl" tells you the available ciphers is listing the defaults for your platform and ASA software level.&lt;/P&gt;
&lt;P&gt;The older 5500 series (non-X) are limited in their support in that the newer TLS 1.2 ciphersuites are not available on their software. You could disable the rc4-sha1 cipher as it is the least strong of the ones your ASA currently has available and active.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 18:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-asdm-communication/m-p/2940382#M150538</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-08-25T18:13:29Z</dc:date>
    </item>
  </channel>
</rss>

