A recent third party security review recommended that we update the ciphers used for our SSL VPN. Our clients connect using the AnyConnect client which I know needs to be upgraded for some users. I am trying to find a guide or steps explaining the process of upgrading to TLS 1.2 (at a minimum) but I also want to understand what version of AnyConnect needs to be in the mix. I don't want to upgrade the ciphers and leave our remote users without a means to connect to the VPN.
Current SSL protocols and ciphers in use:
ssl server-version tlsv1
ssl client-version tlsv1
ssl cipher default custom "RC4-SHA:AES256-SHA:DES-CBC3-SHA"
ssl cipher tlsv1 custom "RC4-SHA:AES256-SHA:DES-CBC3-SHA"
ssl cipher tlsv1.1 medium
ssl cipher tlsv1.2 medium
ssl cipher dtlsv1 custom "RC4-SHA:AES256-SHA:DES-CBC3-SHA"
ssl dh-group group2
ssl ecdh-group group19
I found one article which recommended the following commands be applied:
ssl server-version tlsv1.2
ssl client-version tlsv1.2
ssl cipher tlsv1.2 high
ssl dh-group group24
Would you agree with these changes and what impact if any might there be on the end-user devices.
Thank you for any and all advice