11-12-2015 06:34 PM - edited 03-11-2019 11:52 PM
I am running code 8.2.5. If I allow an SSL/TLS connection to a new server inside can I enforce the use of TLS 1.1. or 1.2 in case the server is not? Or do I not have any control over that within the ASA command set?
Solved! Go to Solution.
11-12-2015 10:58 PM
Hi,
As per my understanding you are having a server inside and you are allowing HTTPS traffic through ASA . So the ASA acts as passthrough device. please correct me if I am wrong.
If it is passthrough traffic for ASA then you need to make the changes on the server or on the clients. Since it is not possible to make the changes on every client you have to enforce the ssl settings on the server itself. Since SSLv3 is obsolete the browsers usually send the TLS1.2 as the SSL version.
You do not have to make any changes on the ASA if the ASA is a passthrough device. Commands which are present on the ASA for SSL is for if the ASA acting as SSL client or server.
P.S. Please rate helpful posts.
Thanks,
Shivapramod M
11-12-2015 07:12 PM
Hi gp1200x,
Available options on ASA 8.2 code are either SSLv3 only , TSLv1 only or any:
ssl client-version [any | sslv3-only | tlsv1-only]
Refer command reference:-
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/command/reference/cmd_ref/s8.html#wp1366107
Regards,
Dinesh Moudgil
P.S. Please rate helpful posts.
11-12-2015 10:58 PM
Hi,
As per my understanding you are having a server inside and you are allowing HTTPS traffic through ASA . So the ASA acts as passthrough device. please correct me if I am wrong.
If it is passthrough traffic for ASA then you need to make the changes on the server or on the clients. Since it is not possible to make the changes on every client you have to enforce the ssl settings on the server itself. Since SSLv3 is obsolete the browsers usually send the TLS1.2 as the SSL version.
You do not have to make any changes on the ASA if the ASA is a passthrough device. Commands which are present on the ASA for SSL is for if the ASA acting as SSL client or server.
P.S. Please rate helpful posts.
Thanks,
Shivapramod M
11-12-2015 11:37 PM
As already mentioned it's not possible with your ASA. If you want to control that on a firewall and not directly on a server or reverse-proxy (I would use a reverse-proxy like NGINX in a DMZ), then one option is the newest generation of ASA with FirePOWER where you can control on SSL-versions. But that would be a completely new device, nothing that you can upgrade your ASA to use.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide