06-02-2015 12:19 AM
Hi
I am running Prime Infrastructure 2.2.1, where I am trying to read data out through the REST API, but I am getting some SSL Handshake error.
Can anybody tell me which SSL Handshake protocols are supported by PI?
Solved! Go to Solution.
06-02-2015 04:50 AM
% nmap --script ssl-enum-ciphers -p 443 cisco-prime
Starting Nmap 6.40 ( http://nmap.org ) at 2015-06-02 13:44 CEST
WARNING: Running Nmap setuid, as you are doing, is a major security risk.
Nmap scan report for cisco-prime
Host is up (0.00018s latency).
rDNS record for x.x.x.x: cisco-prime
PORT STATE SERVICE
443/tcp open https
| ssl-enum-ciphers:
| TLSv1.0:
| ciphers:
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| compressors:
| NULL
| TLSv1.1:
| ciphers:
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| compressors:
| NULL
| TLSv1.2:
| ciphers:
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| compressors:
| NULL
|_ least strength: strong
M.
06-02-2015 04:50 AM
% nmap --script ssl-enum-ciphers -p 443 cisco-prime
Starting Nmap 6.40 ( http://nmap.org ) at 2015-06-02 13:44 CEST
WARNING: Running Nmap setuid, as you are doing, is a major security risk.
Nmap scan report for cisco-prime
Host is up (0.00018s latency).
rDNS record for x.x.x.x: cisco-prime
PORT STATE SERVICE
443/tcp open https
| ssl-enum-ciphers:
| TLSv1.0:
| ciphers:
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| compressors:
| NULL
| TLSv1.1:
| ciphers:
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| compressors:
| NULL
| TLSv1.2:
| ciphers:
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| compressors:
| NULL
|_ least strength: strong
M.
06-02-2015 06:09 AM
M.,
Nice use of nmap. Thanks!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide