<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TLSv1.3 and Weak CBC Ciphers in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/156643#M27020</link>
    <description>&lt;P&gt;Do we have a specific document? No.&lt;BR /&gt;The ciphers we have enabled by default should provide the best mix of usability and security.&lt;BR /&gt;Additional ones can be disabled based on your precise requirements.&lt;/P&gt;</description>
    <pubDate>Tue, 06 Sep 2022 14:36:12 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-09-06T14:36:12Z</dc:date>
    <item>
      <title>TLSv1.3 and Weak CBC Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/155511#M26503</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We are planning to enable the inspection of TLSv1.3 on R81 gateways. I went through the below document to enable it but not really sure whether the interface IPs configured on firewalls will also be inspected with the TLSv1.3. Also may i know whether this will affect the TLSv1.2 traffic passing through the firewall once we enable this option?&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/HTTPS-Inspection.htm#Configuring_Security_Gateways_to_Inspect_TLS_v1.3_Traffic" target="_blank"&gt;HTTPS Inspection (checkpoint.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;We are also planning to disable weak CBC ciphers but did not find any such documents related to disable. When it comes to Cisco ASA it can be done directly in ASDM but not finding any options in Checkpoint, could you please help me with any such documents which helps me with the configuration on removing the weak Ciphers?&lt;/P&gt;&lt;P&gt;Also will there be any impact other than not negotiating with the weak ciphers? Mainly when negotiating for the Remote Access VPN.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sanjay S&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2022 11:29:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/155511#M26503</guid>
      <dc:creator>Sanjay_S</dc:creator>
      <dc:date>2022-08-23T11:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: TLSv1.3 and Weak CBC Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/155517#M26505</link>
      <description>&lt;P&gt;Different infrastructure needs to be enabled to inspect TLS 1.3.&lt;BR /&gt;It will also inspect TLS 1.2 and earlier.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the cipher question:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126613&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126613&amp;amp;partition=Advanced&amp;amp;product=Quantum&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2022 12:01:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/155517#M26505</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-08-23T12:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: TLSv1.3 and Weak CBC Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/155522#M26508</link>
      <description>&lt;P&gt;Thank you PhoneBoy this really helps.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2022 12:42:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/155522#M26508</guid>
      <dc:creator>Sanjay_S</dc:creator>
      <dc:date>2022-08-23T12:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: TLSv1.3 and Weak CBC Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/156629#M27019</link>
      <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;&lt;P&gt;Is there any list of approved Ciphers by Checkpoint to use and weak ciphers list which we can disable?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sanjay S&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 13:27:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/156629#M27019</guid>
      <dc:creator>Sanjay_S</dc:creator>
      <dc:date>2022-09-06T13:27:49Z</dc:date>
    </item>
    <item>
      <title>Re: TLSv1.3 and Weak CBC Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/156643#M27020</link>
      <description>&lt;P&gt;Do we have a specific document? No.&lt;BR /&gt;The ciphers we have enabled by default should provide the best mix of usability and security.&lt;BR /&gt;Additional ones can be disabled based on your precise requirements.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 14:36:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLSv1-3-and-Weak-CBC-Ciphers/m-p/156643#M27020</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-09-06T14:36:12Z</dc:date>
    </item>
  </channel>
</rss>

