cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
366
Views
4
Helpful
6
Replies

how to disable Accept connections using TLSv1

amralrazzaz
Level 5
Level 5

I need to disable the TLSv1.1 on ASA FDM 5516x and i have already disable the TLSv1.0 & 1.1 from SSL Settings via GUI & then according to the below showing command results i still can see TLSv1.1 still active 

 

> show ssl
Accept connections using SSLv3 or greater and negotiate to TLSv1.2 or greater
Start connections using TLSv1 and negotiate to TLSv1 or greater
SSL DH Group: group14 (2048-bit modulus, FIPS)
SSL ECDH Group: group19 (256-bit EC)

SSL trust-points:
Self-signed (RSA 2048 bits RSA-SHA256) certificate available
Self-signed (EC 256 bits ecdsa-with-SHA256) certificate available
Certificate authentication is not enabled
> show running-config ssl
ssl server-version tlsv1.2
ssl cipher tlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES256-GCM-SHA384,DHE-RSA-AES256-GCM-SHA384"
> show running-config all ssl
ssl server-version tlsv1.2
ssl client-version tlsv1
ssl cipher default medium
ssl cipher tlsv1 medium
ssl cipher tlsv1.1 medium
ssl cipher tlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES256-GCM-SHA384,DHE-RSA-AES256-GCM-SHA384"
ssl cipher dtlsv1 medium
ssl dh-group group14
ssl ecdh-group group19
ssl certificate-authentication fca-timeout 2> show ssl> show running-config ssl> show running-config all ssl

> show version
---------------[ EGCAI01-Firepower ]----------------
Model : Cisco ASA5516-X Threat Defense (75) Version 7.0.1 (Build 84)
UUID : 8b6ebab4-5347-11eb-b351-b67ba7c78576
Rules update version : 2023-10-25-001-vrt
VDB version : 353
----------------------------------------------------

 

I have also enable the SSL encryption & Block_SSL3.0_and_TLS1.0_and_TLS1.1 as per below :

amralrazzaz_0-1711117411488.png

amralrazzaz_1-1711117499208.png

 

Also still showing TLSv1.1 enabled on the PRTG server ! so how can i disable TLSv1.1 totally from the fdm !?

 

amr alrazzaz
6 Replies 6

tvotna
Spotlight
Spotlight

You can try to add "ssl client-version tlsv1.2" with FlexConfig (FDM may not accept it though), although this doesn't make much sense on FTD. This command sets TLS version when device is a TLS client, but FTD doesn't support clientless WebVPN and hence doesn't initiate TLS connections from Lina code.

 

THANKS for your reply and i have tried flexconfig but below error coming 

amralrazzaz_0-1711122132197.png

Also that mean i can ignore this one and will be be usable !? and no way to disable it !? or enable TLSv1.2 on client level ?

amr alrazzaz

@amralrazzaz I believe you can only set the TLS settings for Remote Access VPN connections, not the Web GUI - https://www.cisco.com/c/en/us/td/docs/security/firepower/70/fdm/fptd-fdm-config-guide-700/fptd-fdm-system.html#Cisco_Task_in_List_GUI.dita_80e542fa-4b68-4611-bdcc-c0dee2540488

"The SSL cipher settings control which TLS versions and encryption cipher suites are allowed for TLS/SSL connections to the device. Specifically, these settings control the ciphers clients are allowed to use when establishing remote access VPN connections"

An SSL decryption rule would be for traffic through the FTD not to itself.

Now i got you and thanks for clarification.

So in my case with the above outputs from show SSL command s I'm safe !  & for the TLSv1.2 on the client level doesn't matter coz im not using remote access vpn connections for the users! 

 

btw S-RAS or site2site VPN already configured but i think that's not related to our case ! as im targeting the safe remote connection to the FTD GUI via website with stronge encryption methods and i have already change the SSL settings anyway to TLTv1.2 adn creating policy for the traffic goes through the FDM not to the FDM it self as you said & no more action i can do ? right ?

> show running-config ssl
ssl server-version tlsv1.2
ssl cipher tlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES256-GCM-SHA384,DHE-RSA-AES256-GCM-SHA384"
> show ssl
Accept connections using SSLv3 or greater and negotiate to TLSv1.2 or greater
Start connections using TLSv1 and negotiate to TLSv1 or greater
SSL DH Group: group14 (2048-bit modulus, FIPS)
SSL ECDH Group: group19 (256-bit EC)

SSL trust-points:
Self-signed (RSA 2048 bits RSA-SHA256) certificate available
Self-signed (EC 256 bits ecdsa-with-SHA256) certificate available
Certificate authentication is not enabled

 

amr alrazzaz

@Rob Ingram  can you check this too if it okay or i have to do something else? :

> show ssl-policy-config
============[ NGFW-Default-SSL-Policy ]=============

=================[ Default Action ]=================
Default Action : Do Not Decrypt

======[ Category: admin_category (Built-in) ]=======


=====[ Category: standard_category (Built-in) ]=====

-------[ Block_SSL3.0_and_TLS1.0_and_TLS1.1 ]-------
State : Enabled
Action : Block
Source Networks : Source Services : Destination Networks
: Destination Services : URLs
Certificates : Subject DN : Issuer DN
: Versions : SSL v3.0
TLS v1.0
TLS v1.1
Logging Configuration
DC : Yes
End : Yes
Syslog : AC58b5f59a-b6f3-11eb-b14a-572da8a7f4ea


=======[ Category: root_category (Built-in) ]=======


============[ Trusted CA Certificates ]=============


=============[ Undecryptable Actions ]==============
Unsupported Cipher Suite : Inherit Default Action
Unknown Cipher Suite : Inherit Default Action
Compressed Session : Inherit Default Action
Uncached Session ID : Inherit Default Action
SSLv2 Session : Inherit Default Action
Handshake Error : Inherit Default Action
Decryption Error : Block

ALSO I CAN SEE STILL TLSv1.1 enabled on below ! or its just showing the available versions to be using if needed and its not enabled?!

> show ssl-protocol
The supported ssl protocols are TLSv1.1 TLSv1.2
>

amr alrazzaz

I will check this case tonight 

Update you

MHM

Review Cisco Networking products for a $25 gift card