<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Coupe of ideas: in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815731#M173829</link>
    <description>&lt;P&gt;Coupe of ideas:&lt;/P&gt;
&lt;P&gt;Doublecheck that you have the 3DES-AES license on the ASA&lt;/P&gt;
&lt;P&gt;You may need to configure the ssl ciphers explicitly on the ASA.&lt;/P&gt;
&lt;P&gt;You may need to add the Java Cryptography Extension (JCE) strong crypto support on your Java. (http://www.oracle.com/technetwork/java/javase/downloads/jce8-download-2133166.html)&lt;/P&gt;
&lt;P&gt;If that doesn't help, I usually find the Wireshark packet decode of the failed communications more illustrative to determine where it's failing.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Dec 2015 21:39:28 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2015-12-22T21:39:28Z</dc:date>
    <item>
      <title>Using ASDM with 'ssl server-version tlsv1-only'</title>
      <link>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815728#M173824</link>
      <description>&lt;P&gt;If I configure my ASA with the following ASDM does NOT work:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ssl server-version tlsv1-only
ssl client-version tlsv1-only&lt;/PRE&gt;
&lt;P&gt;But if I configure my ASA with the following ASDM DOES work:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ssl server-version tlsv1&lt;BR /&gt;ssl client-version tlsv1-only&lt;/PRE&gt;
&lt;P&gt;My understanding has been that in order to protect myself from POODLE it should be tlsv1-only. &amp;nbsp;And before anyone asks, I have upgraded my production ASA. &amp;nbsp;This is for a lab configuration to support end users that may not be able to upgrade. &amp;nbsp;I don't understand why v1-only doesn't work when configured for the server since my version of Java is configured to support TLSv1.0, 1.1 and 1.2. &amp;nbsp;Debugging SSL produces:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number@s3_pkt.c:430&lt;BR /&gt;error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number@s3_pkt.c:430&lt;BR /&gt;error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number@s3_pkt.c:430&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:03:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815728#M173824</guid>
      <dc:creator>Scott Pickles</dc:creator>
      <dc:date>2019-03-12T07:03:56Z</dc:date>
    </item>
    <item>
      <title>I think all the 9.x trains of</title>
      <link>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815729#M173825</link>
      <description>&lt;P&gt;I think all the 9.x trains of ASA have SSL disabled by default. &amp;nbsp;They also add TLS1.2 support. &amp;nbsp;You would be better off upgrading your firewall to resolve known serious security issues like this. &amp;nbsp;After all, it is a firewall.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2015 00:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815729#M173825</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2015-12-22T00:42:17Z</dc:date>
    </item>
    <item>
      <title>As I stated in my original</title>
      <link>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815730#M173828</link>
      <description>&lt;P&gt;As I stated in my original post: &amp;nbsp;"&lt;SPAN&gt;This is for a lab configuration to support end users that may not be able to upgrade." &amp;nbsp;I'm trying learn WHY it doesn't work in that configuration, not just go "oh well an upgrade will fix it". &amp;nbsp;Even with the upgrade, I should be able to configure 'tlsv1-only' on both the server and client side since my version of Java supports TLS v1.0, v1.1 and v1.2.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2015 20:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815730#M173828</guid>
      <dc:creator>Scott Pickles</dc:creator>
      <dc:date>2015-12-22T20:00:33Z</dc:date>
    </item>
    <item>
      <title>Coupe of ideas:</title>
      <link>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815731#M173829</link>
      <description>&lt;P&gt;Coupe of ideas:&lt;/P&gt;
&lt;P&gt;Doublecheck that you have the 3DES-AES license on the ASA&lt;/P&gt;
&lt;P&gt;You may need to configure the ssl ciphers explicitly on the ASA.&lt;/P&gt;
&lt;P&gt;You may need to add the Java Cryptography Extension (JCE) strong crypto support on your Java. (http://www.oracle.com/technetwork/java/javase/downloads/jce8-download-2133166.html)&lt;/P&gt;
&lt;P&gt;If that doesn't help, I usually find the Wireshark packet decode of the failed communications more illustrative to determine where it's failing.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2015 21:39:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815731#M173829</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-22T21:39:28Z</dc:date>
    </item>
    <item>
      <title>Marvin - </title>
      <link>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815732#M173831</link>
      <description>&lt;P&gt;Marvin -&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Going to look at the JCE option. &amp;nbsp;The other things you mention are already configured:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ssl server-version tlsv1&lt;BR /&gt;ssl client-version tlsv1-only&lt;BR /&gt;ssl encryption dhe-aes128-sha1 dhe-aes256-sha1 aes128-sha1 aes256-sha1&lt;BR /&gt;Encryption-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;/PRE&gt;
&lt;P&gt;*EDIT*: &amp;nbsp;The JCE option makes no difference. &amp;nbsp;Still unable to use ASDM when specifying 'ssl server-version tlsv1-only'.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Dec 2015 14:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815732#M173831</guid>
      <dc:creator>Scott Pickles</dc:creator>
      <dc:date>2015-12-23T14:40:30Z</dc:date>
    </item>
    <item>
      <title>Hi Scott,</title>
      <link>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815733#M173833</link>
      <description>&lt;P&gt;Hi Scott,&lt;/P&gt;
&lt;P&gt;As Marvin mentioned try to take the capture using wire-shark when you connect via ASDM.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Shivapramod M&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Dec 2015 02:29:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asdm-with-ssl-server-version-tlsv1-only/m-p/2815733#M173833</guid>
      <dc:creator>Shivapramod M</dc:creator>
      <dc:date>2015-12-24T02:29:46Z</dc:date>
    </item>
  </channel>
</rss>

