06-11-2019 03:49 AM
Hello All,
We are undergoing a security audit at the moment and the audit is requiring proofs that the network devices are running the latest TLS 1.2 version if applicable.
Is there a way to check the TLS version on Cisco switches ?
Any help would be greatly appreciated.
Solved! Go to Solution.
06-11-2019 04:08 AM
Hi there,
Use nmap (or zenmap if using windows) and run the ssl enumeration script:
nmap --script ssl-enum-ciphers <l3_switch_ip_address>
https://nmap.org/nsedoc/scripts/ssl-enum-ciphers.html
...this will produce an output listing the ciphers available on the switch ordered by TLS version.
cheers,
Seb.
06-11-2019 04:08 AM
Hi there,
Use nmap (or zenmap if using windows) and run the ssl enumeration script:
nmap --script ssl-enum-ciphers <l3_switch_ip_address>
https://nmap.org/nsedoc/scripts/ssl-enum-ciphers.html
...this will produce an output listing the ciphers available on the switch ordered by TLS version.
cheers,
Seb.
06-11-2019 05:40 AM
Thank you so much, this is all we wanted . :)
05-24-2021 10:31 PM
Hi Dhanesh,
A simple command: "sh ip http server all" will show you the TLS version. I don't know why Seb asked you to run that zenmap script. Am I missing something Seb?
05-26-2021 03:07 AM
Hi there,
The OP mentioned they were conducting an audit which typically involves more than one host. Although your command would also show the cipher suite, it would need to be executed on a per-device basis which is not very scalable. Yes, you could use something like ansible or netmiko to execute the script, but both involve additional moving parts.
Using nmap and passing it an IP range as an argument or text file of IP addresses will produce the required information in a single block of output.
cheers,
Seb.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide