<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: I think you would use the in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/3326566#M115544</link>
    <description>&lt;P&gt;Hi Guys,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is there a show command to know if SSLV3 is enabled or disabled on the WLC ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Feb 2018 10:11:15 GMT</pubDate>
    <dc:creator>aous.salloum</dc:creator>
    <dc:date>2018-02-07T10:11:15Z</dc:date>
    <item>
      <title>Enabling TLS for management access in WLC</title>
      <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673565#M115536</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We want to disable to SSL v2 and SSL v3 for WLC web management . And we want to enable TLS version for web gui access. I have seen the below command to disable SSL v2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;B class="cBold"&gt;config network secureweb cipher-option sslv2&lt;/B&gt; {&lt;B class="cBold"&gt;enable&lt;/B&gt; | &lt;B class="cBold"&gt;disable&lt;/B&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But i havent found for SSLv3 and TLS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Vijay&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 10:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673565#M115536</guid>
      <dc:creator>vijay kumar</dc:creator>
      <dc:date>2021-07-05T10:06:09Z</dc:date>
    </item>
    <item>
      <title>Enabling or disabling</title>
      <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673566#M115537</link>
      <description>&lt;H1 class="title topictitle1"&gt;Enabling or disabling TLS&lt;/H1&gt;&lt;P class="shortdesc"&gt;Enabling Transport Layer Security (TLS) enables the storage system to use TLS on HTTPS, FTPS, and LDAP traffic.&lt;/P&gt;&lt;DIV class="section prereq p" id="GUID-3E07D3F8-6A05-49C0-BF92-9C88BA252E1F__GUID-E175DA3A-9650-4215-B0B1-C70DF35450F1"&gt;&lt;DIV class="tasklabel"&gt;&lt;H2 class="sectiontitle tasklabel"&gt;Before you begin&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="p"&gt;TLS is disabled by default, and setting up SSL does not automatically enable TLS. Before enabling TLS, ensure that SSL has been set up and enabled.&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class="section context" id="GUID-3E07D3F8-6A05-49C0-BF92-9C88BA252E1F__GUID-5BCFAB29-33CC-430A-B780-690395BE2DF4"&gt;&lt;DIV class="tasklabel"&gt;&lt;H2 class="sectiontitle tasklabel"&gt;About this task&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="p"&gt;Data ONTAP supports TLSv1, SSLv3, and SSLv2. TLSv1 is a protocol version higher than SSLv3, and SSLv3 is a protocol version higher than SSLv2. A negotiation process is built into the TLS and the SSL protocols to use the highest protocol version that is supported by both the client and the server for communication. For TLS to be used for communication, both the client requesting connection and the storage system must support TLS.&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class="tasklabel"&gt;&lt;H2 class="sectiontitle tasklabel"&gt;Step&lt;/H2&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN class="ph cmd"&gt;To enable or disable TLS, enter the following command: &lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="div_linebreak"&gt;&lt;SPAN class="ph cmd"&gt;&lt;KBD class="ph userinput"&gt;options tls.enable {on|off}&lt;/KBD&gt; &lt;/SPAN&gt;&lt;P class="stepInfo"&gt;&amp;nbsp;&lt;/P&gt;&lt;UL class="ul"&gt;&lt;LI class="li"&gt;&lt;SPAN class="ph cmd"&gt;Use &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;on&lt;/SPAN&gt;&lt;/SPAN&gt; to enable TLS. &lt;/SPAN&gt;&lt;UL class="ul"&gt;&lt;LI class="li"&gt;&lt;SPAN class="ph cmd"&gt;For TLS to take effect on HTTPS, ensure that the &lt;SPAN class="keyword option"&gt;httpd.admin.ssl.enable&lt;/SPAN&gt; option is also set to &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;on&lt;/SPAN&gt;&lt;/SPAN&gt;. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="li"&gt;&lt;SPAN class="ph cmd"&gt;For TLS to take effect on FTPS, ensure that the &lt;SPAN class="keyword option"&gt;ftpd.implicit.enable&lt;/SPAN&gt; option or the &lt;SPAN class="keyword option"&gt;ftpd.explicit.enable&lt;/SPAN&gt; option is also set to &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;on&lt;/SPAN&gt;&lt;/SPAN&gt;. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="li"&gt;&lt;SPAN class="ph cmd"&gt;For TLS to take effect on LDAP, ensure that the &lt;SPAN class="keyword option"&gt;ldap.ssl.enable&lt;/SPAN&gt; option is also set to &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;on&lt;/SPAN&gt;&lt;/SPAN&gt;. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;SPAN class="ph cmd"&gt; &lt;/SPAN&gt;&lt;P class="p"&gt;&lt;SPAN class="ph cmd"&gt;For more information about these options, see the na_options(1) man page. &lt;/SPAN&gt;&lt;/P&gt;&lt;SPAN class="ph cmd"&gt; &lt;/SPAN&gt;&lt;P class="p"&gt;&lt;SPAN class="ph cmd"&gt;For more information about FTPS and LDAP, see the &lt;CITE class="cite"&gt;Data ONTAP File Access and Protocols Management Guide for 7-Mode&lt;/CITE&gt;. &lt;/SPAN&gt;&lt;/P&gt;&lt;SPAN class="ph cmd"&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="li"&gt;&lt;SPAN class="ph cmd"&gt;Use &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;off&lt;/SPAN&gt;&lt;/SPAN&gt; (the default) to disable TLS. &lt;/SPAN&gt;&lt;P class="p"&gt;&lt;SPAN class="ph cmd"&gt;When TLS is disabled, SSL is used for communication if SSL has previously been set up and enabled. &lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI class="li"&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;H1 class="title topictitle1"&gt;Enabling or disabling SSLv2 or SSLv3&lt;/H1&gt;&lt;P class="shortdesc"&gt;If your storage system has the SSL protocol enabled, you can specify the SSL version(s) to use.&lt;/P&gt;&lt;DIV class="section context" id="GUID-2DEFBBCC-F176-4FCA-9402-CCFDBD8A1D66__GUID-5BCFAB29-33CC-430A-B780-690395BE2DF4"&gt;&lt;DIV class="tasklabel"&gt;&lt;H2 class="sectiontitle tasklabel"&gt;About this task&lt;/H2&gt;&lt;/DIV&gt;&lt;P class="p"&gt;Enabling the SSL versions alone does not enable the SSL protocol for the storage system. To use SSL, ensure that the protocol is enabled on your storage system.&lt;/P&gt;&lt;P class="p"&gt;TLS offers better security than SSLv3, and SSLv3 offers better security than SSLv2. In addition to enabling the SSL protocol, you must also have at least one of SSLv2, SSLv3, or TLS enabled for the storage system to use SSL for communication.&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class="tasklabel"&gt;&lt;H2 class="sectiontitle tasklabel"&gt;Step&lt;/H2&gt;&lt;/DIV&gt;&lt;SPAN class="ph cmd"&gt;Enter the following command to enable or disable SSLv2 or SSLv3: &lt;/SPAN&gt;&lt;TABLE border="1" cellpadding="4" cellspacing="0" class="simpletable choicetable choicetableborder" frame="hsides" rules="rows" summary=""&gt;&lt;THEAD&gt;&lt;TR&gt;&lt;TH align="left" id="d21086e48-option" valign="bottom"&gt;To enable or disable this SSL version... &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/TH&gt;&lt;TH align="left" id="d21086e48-desc" valign="bottom"&gt;Enter the following command...&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR class="strow chrow"&gt;&lt;TD class="stentry choption" headers="d21086e48-option" id="d21086e61" valign="top"&gt;SSLv2&lt;/TD&gt;&lt;TD class="stentry chdesc" headers="d21086e48-desc d21086e61" valign="top"&gt;&lt;DIV class="div_linebreak"&gt;&lt;KBD class="ph userinput"&gt;options ssl.v2.enable {on|off}&lt;/KBD&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="strow chrow"&gt;&lt;TD class="stentry choption" headers="d21086e48-option" id="d21086e73" valign="top"&gt;SSLv3&lt;/TD&gt;&lt;TD class="stentry chdesc" headers="d21086e48-desc d21086e73" valign="top"&gt;&lt;DIV class="div_linebreak"&gt;&lt;KBD class="ph userinput"&gt;options ssl.v3.enable {on|off}&lt;/KBD&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P class="stepInfo"&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="p"&gt;Setting the option to &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;on&lt;/SPAN&gt;&lt;/SPAN&gt; (the default) enables the SSL version on HTTPS&lt;SPAN class="ph"&gt;, FTPS,&lt;/SPAN&gt; and LDAP connections, if the following options are also set to &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;on&lt;/SPAN&gt;&lt;/SPAN&gt;:&lt;UL class="ul"&gt;&lt;LI class="li"&gt;&lt;SPAN class="keyword option"&gt;httpd.admin.ssl.enable&lt;/SPAN&gt; (for HTTPS)&lt;/LI&gt;&lt;LI class="li"&gt;&lt;SPAN class="keyword option"&gt;ftpd.implicit.enable&lt;/SPAN&gt; or &lt;SPAN class="keyword option"&gt;ftpd.explicit.enable&lt;/SPAN&gt; (for FTPS)&lt;/LI&gt;&lt;LI class="li"&gt;&lt;SPAN class="keyword option"&gt;ldap.ssl.enable&lt;/SPAN&gt; (for LDAP)&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;P class="p"&gt;Setting the option to &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;off&lt;/SPAN&gt;&lt;/SPAN&gt; disables the SSL version on HTTPS&lt;SPAN class="ph"&gt;, FTPS,&lt;/SPAN&gt; and LDAP connections.&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;SPAN class="ph cmd"&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 10 Jul 2015 18:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673566#M115537</guid>
      <dc:creator>Prakash Parvathala</dc:creator>
      <dc:date>2015-07-10T18:49:21Z</dc:date>
    </item>
    <item>
      <title>Could you clarify something</title>
      <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673567#M115538</link>
      <description>&lt;P&gt;Could you clarify something for me please? Those commands don't appear int the 5508 controller cli?? Am I missing something here?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;options tls.enable {on|off}&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;httpd.admin.ssl.enable&lt;/SPAN&gt; (for HTTPS)&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ftpd.implicit.enable&lt;/SPAN&gt; or &lt;SPAN&gt;ftpd.explicit.enable&lt;/SPAN&gt; (for FTPS)&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ldap.ssl.enable&lt;/SPAN&gt; (for LDAP)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Bryan&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 03:49:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673567#M115538</guid>
      <dc:creator>superflybry</dc:creator>
      <dc:date>2016-07-06T03:49:53Z</dc:date>
    </item>
    <item>
      <title>Those commands are not for a</title>
      <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673568#M115539</link>
      <description>&lt;P&gt;Those commands are not for a WLC.&amp;nbsp; What you are looking for are the secureweb commands that you referenced.&amp;nbsp; To enable SSLv3 use the following:&lt;/P&gt;
&lt;P&gt;config network secureweb sslv3 enable&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To ensure higher level TLS encryption ciphers, use the following:&lt;/P&gt;
&lt;P&gt;config network secureweb ciper-option high&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can also use the command you referenced earlier to disable SSLv2, but keep in mind that if you try accessing the web gui or a client that needs to be re-directed to a captive portal and your browsers aren't configured for SSLv3, you will not be able to access the page.&amp;nbsp; Hope this helps.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2016 16:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673568#M115539</guid>
      <dc:creator>jekuehn</dc:creator>
      <dc:date>2016-08-29T16:22:56Z</dc:date>
    </item>
    <item>
      <title>So, is it currently possible</title>
      <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673569#M115540</link>
      <description>&lt;P&gt;So, is it currently possible to disable both SSLv2 and SSLv3, while enabling TLS? &amp;nbsp;Our security scanner is kicking out the following:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;SSL Version 2 and Version 3 Detected&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;UL class="vuln-column eight columns"&gt;
&lt;LI class="detail-section"&gt;
&lt;H3&gt;Synopsis&lt;/H3&gt;
&lt;SECTION&gt;
&lt;DIV class=""&gt;
&lt;P&gt;The remote service encrypts traffic using a protocol with known weaknesses.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/SECTION&gt;
&lt;/LI&gt;
&lt;LI class="detail-section"&gt;
&lt;H3&gt;Description&lt;/H3&gt;
&lt;SECTION&gt;
&lt;DIV class=""&gt;
&lt;P&gt;The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws. An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.&lt;/P&gt;
&lt;P&gt;NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC'S definition of 'strong cryptography'.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/SECTION&gt;
&lt;/LI&gt;
&lt;LI class="detail-section"&gt;
&lt;H3&gt;Solution&lt;/H3&gt;
&lt;SECTION&gt;
&lt;DIV class=""&gt;
&lt;P&gt;Consult the application's documentation to disable SSL 2.0 and 3.0. Use TLS 1.1 (with approved cipher suites) or higher instead.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/SECTION&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 05 Jan 2017 18:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673569#M115540</guid>
      <dc:creator>michael.bungard1</dc:creator>
      <dc:date>2017-01-05T18:29:09Z</dc:date>
    </item>
    <item>
      <title>I think you would use the</title>
      <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673570#M115541</link>
      <description>&lt;P&gt;I think you would use the following commands:&lt;/P&gt;
&lt;P&gt;config network secureweb sslv3 disable [disables SSLv3]&lt;/P&gt;
&lt;P&gt;config network secureweb cipher-option sslv2 disable [disables SSLv2]&lt;/P&gt;
&lt;P&gt;config network secureweb cipher-option high [enables TLSv1.2]&lt;/P&gt;
&lt;P&gt;Then reload the WLC for the changes to take effect.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 17:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673570#M115541</guid>
      <dc:creator>caradford86</dc:creator>
      <dc:date>2017-01-30T17:21:23Z</dc:date>
    </item>
    <item>
      <title>Beat me to it. :)  Those</title>
      <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673571#M115542</link>
      <description>&lt;P&gt;Beat me to it. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp; Those would be the correct commands.&amp;nbsp; Thanks Chris!&lt;/P&gt;
&lt;P&gt;You may also want to also run the below command because I have seen some scanners ding WLCs for having RC4 ciphers in use as well, but ultimately would depend on your security policy.&lt;/P&gt;
&lt;P&gt;config network secureweb cipher-options rc4-preference disable&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 17:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673571#M115542</guid>
      <dc:creator>jekuehn</dc:creator>
      <dc:date>2017-01-30T17:33:49Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673572#M115543</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I recently used this commands in the following order :&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; &amp;nbsp; config network secureweb cipher-option sslv2 disable&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; &amp;nbsp; config network secureweb cipher-options rc4-preference disable&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;config network secureweb cipher-option high&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;And the result was good, but not enough : &amp;nbsp;The test revealed support for TLSv1.2, TLSv1.1, TLSv1.0 and SSLv3 (No RC4 nor SSLv2 but SSLv3 and DES).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;So I looked for options and found the command to disable SSLv3&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;config network secureweb sslv3 disable&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Checking again we got support only for TLSv1.0 (lost 1.1 and 1.2)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;We thought that it can be a matter of order so I executed again &amp;nbsp;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;config network secureweb cipher-option high&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;No changes. No support enabled for TLSv1.2 nor TLSv1.1, only TLSv1.0. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Re-enabling &amp;nbsp;SSLv3 restored support for this protocol and &amp;nbsp;TLSv1.1 and TLSv1.2.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;(We are currently using ver. 8.0.140)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Mar 2017 21:37:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/2673572#M115543</guid>
      <dc:creator>cmiyas</dc:creator>
      <dc:date>2017-03-06T21:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: I think you would use the</title>
      <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/3326566#M115544</link>
      <description>&lt;P&gt;Hi Guys,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is there a show command to know if SSLV3 is enabled or disabled on the WLC ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 10:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/3326566#M115544</guid>
      <dc:creator>aous.salloum</dc:creator>
      <dc:date>2018-02-07T10:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling TLS for management access in WLC</title>
      <link>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/3765236#M115545</link>
      <description>&lt;P&gt;Hello Team - Was anyone able to get rid of tlsv1.0?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 17:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/enabling-tls-for-management-access-in-wlc/m-p/3765236#M115545</guid>
      <dc:creator>alexandro.angel@softtek.com</dc:creator>
      <dc:date>2018-12-17T17:42:42Z</dc:date>
    </item>
  </channel>
</rss>

