01-11-2013 10:31 AM
Does anyone know of a fix for the Beast vulnerability on the ACE 20 module?
Is there a way to enable TLS 1.1 and/or 1.2? How can I verify that SSL 2.0 is disabled? Also, is there any way to prioritize the ciphers to ensure that RC4 is used first?
Thanks.
Jason
Solved! Go to Solution.
01-11-2013 11:34 AM
The SSL and TLS version can be specified by using the version command in the parameter map. The keywords for the version command are:
•all—(Default) The ACE supports both SSL Version 3.0 and Transport Layer Security (TLS) Version 1.0.
•ssl3—The ACE supports only SSL Version 3.0.
•tls1—The ACE supports only TLS Version 1.0.
You can also prioritize the ciphers by setting the priority. The higher priority is more preferred.
cipher cipher_name [priority cipher_priority]
Here is the link to the ACE SSL guide that details defining the SSL and TLS versions:
01-11-2013 11:34 AM
The SSL and TLS version can be specified by using the version command in the parameter map. The keywords for the version command are:
•all—(Default) The ACE supports both SSL Version 3.0 and Transport Layer Security (TLS) Version 1.0.
•ssl3—The ACE supports only SSL Version 3.0.
•tls1—The ACE supports only TLS Version 1.0.
You can also prioritize the ciphers by setting the priority. The higher priority is more preferred.
cipher cipher_name [priority cipher_priority]
Here is the link to the ACE SSL guide that details defining the SSL and TLS versions:
01-11-2013 11:40 AM
That will work. Hopefully Cisco will enable TLS 1.1/2 soon, but for now prioritizing the cipher should allow us to pass a PCI audit.
Thank you.
Jason
01-11-2013 11:45 AM
Here is also the link for the ACE20 code SSL guide. The one I sent earlier was for the A5 version. The support is the same though.
You can specify the version of the security protocol that the ACE supports during the SSL handshake with its peer by using the version command in parameter map SSL configuration mode.
The syntax of this command is as follows:
version {all | ssl3 | tls1}
The keywords are as follows:
•all—(Default) The ACE supports both SSL Version 3.0 and Transport Layer Security (TLS) Version 1.0.
•ssl3—The ACE supports only SSL Version 3.0.
•tls1—The ACE supports only TLS Version 1.0.
For example, to specify SSL Version 3.0 for the parameter map, enter:
host1/Admin(config)# parameter-map type ssl PARAMMAP_SSL
host1/Admin(config-parammap-ssl)# version ssl3
To remove a security protocol version from the SSL proxy parameter map, enter:
host1/Admin(config-parammap-ssl)# no version tlsl
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide