<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TLS1.0 on appliance management portals in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131947#M74209</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5933"&gt;@genisis__&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;In order to revert the change - it is more correct to delete the registry key.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So to recap, in order to enforce the use of a minimum version of TLSv1.2:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 CKPSSL_MIN_TLS_VERSION TLS1.2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;and then restart the services (cpstop ; cpstart).&lt;/P&gt;
&lt;P&gt;In order&amp;nbsp;&lt;SPAN style="font-family: inherit; background-color: #ffffff;"&gt;to revert the change, run:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ckp_regedit -d SOFTWARE\\CheckPoint\\FW1 CKPSSL_MIN_TLS_VERSION&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;and then restart the services (cpstop ; cpstart).&lt;/P&gt;
&lt;P&gt;This procedure needs to be done on every gateway/management machine separately.&lt;/P&gt;</description>
    <pubDate>Mon, 18 Oct 2021 09:25:18 GMT</pubDate>
    <dc:creator>Ethan_Schorer</dc:creator>
    <dc:date>2021-10-18T09:25:18Z</dc:date>
    <item>
      <title>TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131801#M74200</link>
      <description>&lt;P&gt;Hello Guys&lt;BR /&gt;After a vulnerability scan on the management network, it was discovered that the web portals of the Management Server r80.40 are accepting TLS1.0&lt;BR /&gt;We have applied &lt;A title="sk147272" href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk147272" target="_blank" rel="noopener"&gt;sk147272: Vulnerability scan shows that Gaia Portal supports SSL medium strength cipher suites&lt;/A&gt; and disabled the TLS1.0 and TLS1.1 from the web portals that run on port 443&lt;BR /&gt;As this is a management server, it has the certificate authority running, so there is the ICA Management Tool running on port 18265 and still accepting TLS1.0&lt;BR /&gt;Do you know what configuration file I have to change in order to disable TLS1.0 for the web server on port 18265 that holds the ICA Management Tool?&lt;BR /&gt;Thanks in advance&lt;BR /&gt;Edison&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 22:02:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131801#M74200</guid>
      <dc:creator>3d150n</dc:creator>
      <dc:date>2021-10-14T22:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131878#M74201</link>
      <description>&lt;P&gt;The ICA Management Tool is off by default and, if I understand the various SKs, should be disabled when you are not using it.&lt;BR /&gt;That said, seems reasonable we should be able to disable TLS 1.0.&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/10237"&gt;@Ethan_Schorer&lt;/a&gt;&amp;nbsp;is this something you can help with?&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 04:08:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131878#M74201</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-10-17T04:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131881#M74202</link>
      <description>&lt;P&gt;I posted this a while back, but you could try this:&lt;/P&gt;
&lt;P&gt;Here is what I did:&lt;/P&gt;
&lt;P&gt;clear&lt;BR /&gt;ls -l /web/templates/httpd-ssl.conf.templ&lt;BR /&gt;#Note: Above just confirms permissions set back to read-only.&lt;BR /&gt;cp /web/templates/httpd-ssl.conf.templ /web/templates/httpd-ssl.conf.templ_ORIGINAL&lt;BR /&gt;chmod u+w /web/templates/httpd-ssl.conf.templ&lt;BR /&gt;sed -i 's/SSLCipherSuite HIGH:!RC4:!LOW:!EXP:!aNULL:!SSLv2:!MD5/SSLCipherSuite ECDHE-RSA-AES256-SHA384:AES256-SHA256:!ADH:!EXP:!RSA:+HIGH:+MEDIUM:!MD5:!LOW:!NULL:!SSLv2:!eNULL:!aNULL:!RC4:!SHA1/g' /web/templates/httpd-ssl.conf.templ&lt;BR /&gt;sed -i 's/SSLProtocol -ALL {ifcmp = $httpd:ssl3_enabled 1}+{else}-{endif}SSLv3 +TLSv1 +TLSv1.1 +TLSv1.2/SSLProtocol -ALL {ifcmp = $httpd:ssl3_enabled 1}+{else}-{endif}TLSv1.2 +TLSv1.3/g' /web/templates/httpd-ssl.conf.templ&lt;BR /&gt;chmod u-w /web/templates/httpd-ssl.conf.templ&lt;BR /&gt;/bin/template_xlate : /web/templates/httpd-ssl.conf.templ /web/conf/extra/httpd-ssl.conf &amp;lt; /config/active&lt;BR /&gt;tellpm process:httpd2&lt;BR /&gt;tellpm process:httpd2 t&lt;BR /&gt;ls -l /web/templates/httpd-ssl.conf.templ&lt;BR /&gt;#Note: Above just confirms permissions set back to read-only.&lt;/P&gt;
&lt;P&gt;I then ran an sslscan against the IP which resulted in only TLSv1.3 being seen.&lt;/P&gt;
&lt;P&gt;Testing SSL server aa.bb.cc.dd on port 443 using SNI name aa.bb.cc.dd&lt;/P&gt;
&lt;P&gt;SSL/TLS Protocols:&lt;BR /&gt;SSLv2 disabled&lt;BR /&gt;SSLv3 disabled&lt;BR /&gt;TLSv1.0 disabled&lt;BR /&gt;TLSv1.1 disabled&lt;BR /&gt;TLSv1.2 disabled&lt;BR /&gt;TLSv1.3 enabled&lt;/P&gt;
&lt;P&gt;TLS Fallback SCSV:&lt;BR /&gt;Server supports TLS Fallback SCSV&lt;/P&gt;
&lt;P&gt;TLS renegotiation:&lt;BR /&gt;Session renegotiation not supported&lt;/P&gt;
&lt;P&gt;TLS Compression:&lt;BR /&gt;Compression disabled&lt;/P&gt;
&lt;P&gt;Heartbleed:&lt;BR /&gt;TLSv1.3 not vulnerable to heartbleed&lt;/P&gt;
&lt;P&gt;Supported Server Cipher(s):&lt;BR /&gt;Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253&lt;BR /&gt;Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253&lt;BR /&gt;Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253&lt;/P&gt;
&lt;P&gt;Server Key Exchange Group(s):&lt;BR /&gt;TLSv1.3 128 bits secp256r1 (NIST P-256)&lt;BR /&gt;TLSv1.3 192 bits secp384r1 (NIST P-384)&lt;BR /&gt;TLSv1.3 260 bits secp521r1 (NIST P-521)&lt;BR /&gt;TLSv1.3 128 bits x25519&lt;BR /&gt;TLSv1.3 224 bits x448&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I'm not sure about is if this procedure would need to run again after updating the jumbo.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 08:48:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131881#M74202</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-10-17T08:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131882#M74203</link>
      <description>&lt;P&gt;Is TLS 1.0 even still used in R81.x?&amp;nbsp; I would have though this should be removed by now and have a minimum version of TLSv1.2 but prefer TLSv1.3.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 08:51:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131882#M74203</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-10-17T08:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131884#M74204</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/66321"&gt;@3d150n&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;You can follow the guidelines in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk121356" target="_blank" rel="noopener"&gt;sk121356&lt;/A&gt;&amp;nbsp; for setting the minimum to TLSv1.2 (I know the SK is about TE - but it affects this portal as well - I'm working on updating the SK).&lt;/P&gt;
&lt;P&gt;Basically, this is what needs to be run in Expert mode:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;[Expert@GW]#&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 CKPSSL_MIN_TLS_VERSION TLS1.2&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;[Expert@GW]#&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;cprestart&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Ethan&lt;/P&gt;
&lt;P&gt;p.s. Thank you to&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/32928"&gt;@matangi&lt;/a&gt;&amp;nbsp;for the guidance&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 13:01:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131884#M74204</guid>
      <dc:creator>Ethan_Schorer</dc:creator>
      <dc:date>2021-10-17T13:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131889#M74205</link>
      <description>&lt;P&gt;Is the SK also relevant to R81.x?&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 12:44:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131889#M74205</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-10-17T12:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131904#M74206</link>
      <description>&lt;P&gt;Yes,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5933"&gt;@genisis__&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's one of the changes that we're putting into the SK - the supported versions.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 14:12:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131904#M74206</guid>
      <dc:creator>Ethan_Schorer</dc:creator>
      <dc:date>2021-10-17T14:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131911#M74207</link>
      <description>&lt;P&gt;So to recap, in order to enforce the use of a minimum version of TLSv1.2 for all SSL control connections we simply run:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 CKPSSL_MIN_TLS_VERSION TLS1.2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;and then restart the services.&lt;/P&gt;
&lt;P&gt;Additionally if we wanted to revert the change then we would paste the below?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 CKPSSL_MIN_TLS_VERSION TLS1.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Also is this procedure specific to the management layer or does it apply to gateways as well?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 20:52:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131911#M74207</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-10-17T20:52:03Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131915#M74208</link>
      <description>&lt;P&gt;Pretty certain this needs to be applied on each gateway also.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 21:01:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131915#M74208</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-10-17T21:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131947#M74209</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5933"&gt;@genisis__&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;In order to revert the change - it is more correct to delete the registry key.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So to recap, in order to enforce the use of a minimum version of TLSv1.2:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 CKPSSL_MIN_TLS_VERSION TLS1.2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;and then restart the services (cpstop ; cpstart).&lt;/P&gt;
&lt;P&gt;In order&amp;nbsp;&lt;SPAN style="font-family: inherit; background-color: #ffffff;"&gt;to revert the change, run:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ckp_regedit -d SOFTWARE\\CheckPoint\\FW1 CKPSSL_MIN_TLS_VERSION&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;and then restart the services (cpstop ; cpstart).&lt;/P&gt;
&lt;P&gt;This procedure needs to be done on every gateway/management machine separately.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 09:25:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131947#M74209</guid>
      <dc:creator>Ethan_Schorer</dc:creator>
      <dc:date>2021-10-18T09:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131958#M74210</link>
      <description>&lt;P&gt;Would suggest the back-out procedure is also included in the SK.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 10:37:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/131958#M74210</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-10-18T10:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132002#M74212</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5933"&gt;@genisis__&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have already done this procedure as descibed on sk147272 but it only affects the web server on port 443&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Edison&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 16:52:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132002#M74212</guid>
      <dc:creator>3d150n</dc:creator>
      <dc:date>2021-10-18T16:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132021#M74213</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/10237"&gt;@Ethan_Schorer&lt;/a&gt;just one last thing:&lt;/P&gt;&lt;P&gt;is there any way to disable 3des from the ciphers?&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;root@tester:~# nmap --script ssl-enum-ciphers -p 18265 aa.bb.cc.dd&lt;BR /&gt;Starting Nmap 7.92 ( &lt;A href="https://nmap.org" target="_blank"&gt;https://nmap.org&lt;/A&gt; ) at 2021-10-18 16:20 UTC&lt;BR /&gt;Nmap scan report for aa.bb.cc.dd&lt;BR /&gt;Host is up (0.00027s latency).&lt;/P&gt;&lt;P&gt;PORT STATE SERVICE&lt;BR /&gt;18265/tcp open unknown&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.2:&lt;BR /&gt;| ciphers:&lt;BR /&gt;&lt;STRONG&gt;| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C&lt;/STRONG&gt;&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| cipher preference: client&lt;BR /&gt;| warnings:&lt;BR /&gt;&lt;STRONG&gt;| 64-bit block cipher 3DES vulnerable to SWEET32 attack&lt;/STRONG&gt;&lt;BR /&gt;| Forward Secrecy not supported by any cipher&lt;BR /&gt;|_ least strength: C&lt;BR /&gt;MAC Address: 00:0C:29:71:D2:C7 (VMware)&lt;/P&gt;&lt;P&gt;Nmap done: 1 IP address (1 host up) scanned in 0.51 seconds&lt;BR /&gt;root@tester:~#&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 23:22:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132021#M74213</guid>
      <dc:creator>3d150n</dc:creator>
      <dc:date>2021-10-18T23:22:11Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132077#M74214</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/66321"&gt;@3d150n&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Please see our response to Sweet32 attack at&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk113114&amp;amp;partition=Basic&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;sk113114&lt;/A&gt; (and why we aren't vulnerable).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;If you want to disable, the instructions are in the SK (I believe for this port you should follow the section labeled "instructions for HTTPS Inspection, Identity Awareness Portal, ICA Portal, SmartManagement Portal, SecurePlatform WebUI")&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ethan&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 10:21:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132077#M74214</guid>
      <dc:creator>Ethan_Schorer</dc:creator>
      <dc:date>2021-10-19T10:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132118#M74215</link>
      <description>&lt;P&gt;Thank you very much to all the community&lt;/P&gt;&lt;P&gt;both registry keys (from sk121356 and sk113114) helped me to fix the issue. There are not any new discovery from the security scanner&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 13:56:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132118#M74215</guid>
      <dc:creator>3d150n</dc:creator>
      <dc:date>2021-10-19T13:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132557#M74216</link>
      <description>&lt;P&gt;This is now documented in&amp;nbsp;&lt;SPAN&gt;sk121356:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://supportcontent.checkpoint.com/solutions?id=sk121356" target="_blank"&gt;https://supportcontent.checkpoint.com/solutions?id=sk121356&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Oct 2021 14:19:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132557#M74216</guid>
      <dc:creator>Ethan_Schorer</dc:creator>
      <dc:date>2021-10-25T14:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132567#M74217</link>
      <description>&lt;P&gt;Can I confirm the procedure is also the same for MDSM?&amp;nbsp; ie.&amp;nbsp; switch into the DMS then run the procedure, or run from the main starting point?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Oct 2021 19:44:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/132567#M74217</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-10-25T19:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/150841#M74218</link>
      <description>&lt;P&gt;Is there a difference between sk147272 and sk154532 related to TLS? 532 seems like an easier way to disable TLS1.0.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 22:04:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/150841#M74218</guid>
      <dc:creator>John_Richards</dc:creator>
      <dc:date>2022-06-14T22:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on appliance management portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/150989#M74219</link>
      <description>&lt;P&gt;If you're just concerned about TLS 1.2, then sk154532 is adequate.&lt;BR /&gt;If you need to adjust further (e.g. only certain ciphers be enabled) then you need sk147272.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 18:40:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-0-on-appliance-management-portals/m-p/150989#M74219</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-06-15T18:40:02Z</dc:date>
    </item>
  </channel>
</rss>

