<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,ssl server-versionTo set in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721216#M190537</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;ssl server-version&lt;/P&gt;&lt;P&gt;To set the minimum protocol version for which the ASA will negotiate an SSL/TLS connection, use the ssl server-version command in global configuration mode. To revert to the default, any, use the no form of this command.&amp;nbsp;&lt;/P&gt;&lt;P&gt;ssl client-version&lt;/P&gt;&lt;P&gt;To specify the SSL/TLS protocol version that the ASA uses when acting as a client, use the ssl client-version command in global configuration mode.&amp;nbsp;&lt;/P&gt;&lt;P&gt;ssl certificate-authentication&lt;/P&gt;&lt;P&gt;To enable client certificate authentication for backwards compatibility for versions previous to 8.2(1), use the ssl certificate-authentication command in global configuration mode&lt;/P&gt;&lt;P&gt;Once you enable client certificate authentication, you will the below result.&lt;/P&gt;&lt;P&gt;N18-ASA5500-1(config)# sh ssl&lt;BR /&gt;Accept connections using SSLv2, SSLv3 or TLSv1 and negotiate to TLSv1&lt;BR /&gt;Start connections using TLSv1 and negotiate to TLSv1&lt;BR /&gt;Enabled cipher order: rc4-sha1 dhe-aes128-sha1 dhe-aes256-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;Disabled ciphers: des-sha1 rc4-md5 null-sha1&lt;BR /&gt;No SSL trust-points configured&lt;BR /&gt;Certificate authentication:&lt;BR /&gt;&amp;nbsp; outside interface: port 443&lt;/P&gt;&lt;P&gt;SSL trustpoints are needed to bind the certificates and use them for vpn, anyconnect etc. You bind trustpoints with tunnel groups.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;P&gt;Note: Please mark answers if they are helpful.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jun 2015 20:14:14 GMT</pubDate>
    <dc:creator>Kanwaljeet Singh</dc:creator>
    <dc:date>2015-06-16T20:14:14Z</dc:date>
    <item>
      <title>Check the status of SSL</title>
      <link>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721215#M190536</link>
      <description>&lt;P&gt;Hi I want to confirm the status of SSL in ASA. I used two commands to do that. But it looks like that the two commands got me two different results. First command show run all ssl tells some version etc, but second command show ssl tells Certificate authentication is not enabled. Any one can explain it for me ? Thank you&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;COV/pri/act# sh run all ssl&lt;BR /&gt;&lt;STRONG&gt;ssl server-version any&lt;BR /&gt;ssl client-version any&lt;/STRONG&gt;&lt;BR /&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;ssl certificate-authentication fca-timeout 2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;COV/pri/act# sh ssl&lt;BR /&gt;Accept connections using SSLv2, SSLv3 or TLSv1 and negotiate to SSLv3 or TLSv1&lt;BR /&gt;Start connections using SSLv3 and negotiate to SSLv3 or TLSv1&lt;BR /&gt;Enabled cipher order: rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;Disabled ciphers: des-sha1 rc4-md5 dhe-aes128-sha1 dhe-aes256-sha1 null-sha1&lt;BR /&gt;&lt;STRONG&gt;No SSL trust-points configured&lt;BR /&gt;Certificate authentication is not enabled&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721215#M190536</guid>
      <dc:creator>wfqk</dc:creator>
      <dc:date>2019-03-12T06:07:50Z</dc:date>
    </item>
    <item>
      <title>Hi,ssl server-versionTo set</title>
      <link>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721216#M190537</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;ssl server-version&lt;/P&gt;&lt;P&gt;To set the minimum protocol version for which the ASA will negotiate an SSL/TLS connection, use the ssl server-version command in global configuration mode. To revert to the default, any, use the no form of this command.&amp;nbsp;&lt;/P&gt;&lt;P&gt;ssl client-version&lt;/P&gt;&lt;P&gt;To specify the SSL/TLS protocol version that the ASA uses when acting as a client, use the ssl client-version command in global configuration mode.&amp;nbsp;&lt;/P&gt;&lt;P&gt;ssl certificate-authentication&lt;/P&gt;&lt;P&gt;To enable client certificate authentication for backwards compatibility for versions previous to 8.2(1), use the ssl certificate-authentication command in global configuration mode&lt;/P&gt;&lt;P&gt;Once you enable client certificate authentication, you will the below result.&lt;/P&gt;&lt;P&gt;N18-ASA5500-1(config)# sh ssl&lt;BR /&gt;Accept connections using SSLv2, SSLv3 or TLSv1 and negotiate to TLSv1&lt;BR /&gt;Start connections using TLSv1 and negotiate to TLSv1&lt;BR /&gt;Enabled cipher order: rc4-sha1 dhe-aes128-sha1 dhe-aes256-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;Disabled ciphers: des-sha1 rc4-md5 null-sha1&lt;BR /&gt;No SSL trust-points configured&lt;BR /&gt;Certificate authentication:&lt;BR /&gt;&amp;nbsp; outside interface: port 443&lt;/P&gt;&lt;P&gt;SSL trustpoints are needed to bind the certificates and use them for vpn, anyconnect etc. You bind trustpoints with tunnel groups.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;P&gt;Note: Please mark answers if they are helpful.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2015 20:14:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721216#M190537</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2015-06-16T20:14:14Z</dc:date>
    </item>
    <item>
      <title>Thank you so much for your</title>
      <link>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721217#M190538</link>
      <description>&lt;P&gt;Thank you so much for your reply. Can you take a look at the below.&lt;/P&gt;&lt;P&gt;It show&amp;nbsp;&lt;STRONG&gt;SSL trust-points:&amp;nbsp;&amp;nbsp;outside interface: GoDaddy_TP,&amp;nbsp;&lt;/STRONG&gt;but&amp;nbsp;&lt;STRONG&gt;Certificate authentication is not enabled&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Do you think the SSL is active ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;COFW/pri/act# sh ssl&lt;/P&gt;&lt;P&gt;Accept connections using SSLv2, SSLv3 or TLSv1 and negotiate to SSLv3 or TLSv1&lt;/P&gt;&lt;P&gt;Start connections using SSLv3 and negotiate to SSLv3 or TLSv1&lt;/P&gt;&lt;P&gt;Enabled cipher order: rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;/P&gt;&lt;P&gt;Disabled ciphers: des-sha1 rc4-md5 dhe-aes128-sha1 dhe-aes256-sha1 null-sha1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SSL trust-points:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; outside interface: GoDaddy_TP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Certificate authentication is not enabled&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;COFW/pri/act# sh run ssl&lt;/P&gt;&lt;P&gt;ssl trust-point GoDaddy_TP outside&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2015 20:39:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721217#M190538</guid>
      <dc:creator>wfqk</dc:creator>
      <dc:date>2015-06-16T20:39:09Z</dc:date>
    </item>
    <item>
      <title>Hi,That has nothing to do</title>
      <link>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721218#M190539</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;That has nothing to do with SSL being enabled or not but client cert authentication as shown above.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;P&gt;Note: Please mark answers if they are helpful.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2015 20:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721218#M190539</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2015-06-16T20:39:10Z</dc:date>
    </item>
    <item>
      <title>You mean the below SSL is</title>
      <link>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721219#M190540</link>
      <description>&lt;P&gt;You mean the below SSL is inactive, right ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;COFW/pri/act# sh ssl&lt;/P&gt;&lt;P&gt;Accept connections using SSLv2, SSLv3 or TLSv1 and negotiate to SSLv3 or TLSv1&lt;/P&gt;&lt;P&gt;Start connections using SSLv3 and negotiate to SSLv3 or TLSv1&lt;/P&gt;&lt;P&gt;Enabled cipher order: rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;/P&gt;&lt;P&gt;Disabled ciphers: des-sha1 rc4-md5 dhe-aes128-sha1 dhe-aes256-sha1 null-sha1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SSL trust-points:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; outside interface: GoDaddy_TP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Certificate authentication is not enabled&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2015 20:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721219#M190540</guid>
      <dc:creator>wfqk</dc:creator>
      <dc:date>2015-06-16T20:58:40Z</dc:date>
    </item>
    <item>
      <title>Hi,No it is not. Only client</title>
      <link>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721220#M190541</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;No it is not. Only client certificate authentication is not enabled which is an optional step in SSL handshake. You can enable it if you want a user to connect to ASA via https be required to authenticate itself. You can test this by enabling HTTPS/ASDM access on an interface. You would see that if ssl certificate-authentication is enabled and client is trying to connect without presenting certificate, it won't be able to connect.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;P&gt;Note: Please mark answers if they are helpful.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2015 21:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721220#M190541</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2015-06-16T21:03:36Z</dc:date>
    </item>
    <item>
      <title>Thank you so much for your</title>
      <link>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721221#M190542</link>
      <description>&lt;P&gt;Thank you so much for your explanation.&lt;/P&gt;&lt;P&gt;Can we say it like this:&lt;/P&gt;&lt;P&gt;The successful connection requires several&amp;nbsp;things. One is certificate user present, another is what ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, as long as we see&amp;nbsp;&lt;STRONG&gt;Certificate authentication is not enabled, &lt;/STRONG&gt;we can think the SSL is inactive, right ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2015 21:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721221#M190542</guid>
      <dc:creator>wfqk</dc:creator>
      <dc:date>2015-06-16T21:23:20Z</dc:date>
    </item>
    <item>
      <title>Hi,I just tested it and i am</title>
      <link>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721222#M190543</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I just tested it and i am able to connect when i don't have ssl certificate-authentication interface outside port 443 command in my configuration. But if i&amp;nbsp; put it in, i am unable to connect to ASA using HTTPS. But weird thing is i don't see ASA requesting for client certificate in server hello. It actually succeeds as per pcaps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And it doesn't mean that SSL is inactive. You can actually connect to it using HTTPS. Please enable asdm and check out yourself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will look into it more later. Gotta go on another call:)&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;P&gt;Note: Please mark answers if they are helpful.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2015 21:26:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-the-status-of-ssl/m-p/2721222#M190543</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2015-06-16T21:26:46Z</dc:date>
    </item>
  </channel>
</rss>

