<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Self Signed Certificate Findings on Nessus Scans on Cisco 3750 - 24PS-E in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-self-signed-certificate-findings-on-nessus-scans-on-cisco/m-p/3353237#M903077</link>
    <description>&lt;P&gt;When our IA team performed security scans, an SSL Self-Signed medium finding was discovered along with other SSL findings. How do I resolve this issue? We do not use a CA, just a generated cipher and cert by the switch itself along with all the other switches on our network. How do i go in too check the SSLs, change, delete or update? The switch is currently running C3750-IPSERVICESk9-M 12.2(55)SE11 IOS. Would an IOS upgrade resolve any of the issues below? I cannot find any information on the possibility of it solving any of these issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below are the other findings:&lt;/P&gt;
&lt;P&gt;SSL Certificate cannot be trusted&lt;/P&gt;
&lt;P&gt;SSL Version 2 and 3 Protocol Deletion&lt;/P&gt;
&lt;P&gt;SSL Weak Cipher Suites Supported&lt;/P&gt;
&lt;P&gt;SSL Certificate sighned using weak hashing algorithm&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SSL Medium Strength cipher suites supported&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SSL Self signed certificate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SSLv3 Padding Oracle on Downgraded Legacy Encryption Vulnerability (POODLE)&lt;/P&gt;
&lt;P&gt;NTP Mode 6 Scanner&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:33:06 GMT</pubDate>
    <dc:creator>gbenoit83</dc:creator>
    <dc:date>2020-02-21T15:33:06Z</dc:date>
    <item>
      <title>SSL Self Signed Certificate Findings on Nessus Scans on Cisco 3750 - 24PS-E</title>
      <link>https://community.cisco.com/t5/network-security/ssl-self-signed-certificate-findings-on-nessus-scans-on-cisco/m-p/3353237#M903077</link>
      <description>&lt;P&gt;When our IA team performed security scans, an SSL Self-Signed medium finding was discovered along with other SSL findings. How do I resolve this issue? We do not use a CA, just a generated cipher and cert by the switch itself along with all the other switches on our network. How do i go in too check the SSLs, change, delete or update? The switch is currently running C3750-IPSERVICESk9-M 12.2(55)SE11 IOS. Would an IOS upgrade resolve any of the issues below? I cannot find any information on the possibility of it solving any of these issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below are the other findings:&lt;/P&gt;
&lt;P&gt;SSL Certificate cannot be trusted&lt;/P&gt;
&lt;P&gt;SSL Version 2 and 3 Protocol Deletion&lt;/P&gt;
&lt;P&gt;SSL Weak Cipher Suites Supported&lt;/P&gt;
&lt;P&gt;SSL Certificate sighned using weak hashing algorithm&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SSL Medium Strength cipher suites supported&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SSL Self signed certificate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SSLv3 Padding Oracle on Downgraded Legacy Encryption Vulnerability (POODLE)&lt;/P&gt;
&lt;P&gt;NTP Mode 6 Scanner&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:33:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-self-signed-certificate-findings-on-nessus-scans-on-cisco/m-p/3353237#M903077</guid>
      <dc:creator>gbenoit83</dc:creator>
      <dc:date>2020-02-21T15:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Self Signed Certificate Findings on Nessus Scans on Cisco 3750 - 24PS-E</title>
      <link>https://community.cisco.com/t5/network-security/ssl-self-signed-certificate-findings-on-nessus-scans-on-cisco/m-p/3353476#M903079</link>
      <description>&lt;P&gt;Greg,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you use the commands below this should clear up your findings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="line number1 index0 alt2"&gt;&lt;CODE class="text plain"&gt;no ip http secure-server&lt;/CODE&gt;&lt;/DIV&gt;
&lt;DIV class="line number2 index1 alt1"&gt;&lt;CODE class="text plain"&gt;no ip http server&lt;/CODE&gt;&lt;/DIV&gt;
&lt;DIV class="line number2 index1 alt1"&gt;&lt;CODE class="text plain"&gt;&amp;nbsp;&lt;/CODE&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 22 Mar 2018 19:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-self-signed-certificate-findings-on-nessus-scans-on-cisco/m-p/3353476#M903079</guid>
      <dc:creator>mburnno</dc:creator>
      <dc:date>2018-03-22T19:14:32Z</dc:date>
    </item>
  </channel>
</rss>

