<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable TLS 1.0 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/209489#M34697</link>
    <description>&lt;P&gt;Not in the HTTPS Inspection policy.&lt;BR /&gt;Because you need to connect with TLS 1.0 to some site, this needs to be enabled globally.&lt;BR /&gt;You could, in the Threat Prevention and/or Access Control policy, block TLS 1.0 and 1.1 for all but specific sites (possibly using inline rules).&lt;/P&gt;</description>
    <pubDate>Fri, 22 Mar 2024 14:55:45 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-03-22T14:55:45Z</dc:date>
    <item>
      <title>Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70338#M14237</link>
      <description>&lt;P&gt;I'm asking this question to a vendor as well. However, I will ask here too. I'm trying to disable TLS1.0 globally on a firewall cluster. This is in an effort to completely eliminate all HTTPS weak ciphers. I've been scanning our environment with various tools and found that TLS 1.0 is still a valid cipher when I scan my cluster IP addresses.&lt;/P&gt;&lt;P&gt;So far, I haven't been able to find any documentation on how to do this with Checkpoint. On an ASA it's 2 or 3 commands to stop supporting the cipher. The only thing I've seen in forums is that on Checkpoint it's not possible. Is this true?&lt;/P&gt;&lt;P&gt;I'm running R80.30 so I would think you would be able to do this but maybe not.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 19:01:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70338#M14237</guid>
      <dc:creator>JG</dc:creator>
      <dc:date>2019-12-12T19:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70346#M14239</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;For HTTPS Inspection:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;First create a snapshot of your system!!!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Instructions for versions R80.10 and above&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If '&lt;EM&gt;HTTPS Inspection&lt;/EM&gt;' blade is enabled on a Security Gateway, then configure it &lt;EM&gt;not&lt;/EM&gt; to use TLS 1.0.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important Note:&lt;/STRONG&gt; Some servers on the Internet still use TLS 1.0. Once this step is performed, there will be &lt;EM&gt;no&lt;/EM&gt; connectivity to these servers through the Security Gateway.&lt;/P&gt;
&lt;OL type="A"&gt;
&lt;LI&gt;Connect with SmartDashboard to Security Management Server / Domain Management Server. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Go to '&lt;EM&gt;File&lt;/EM&gt;' menu - click on '&lt;EM&gt;Database Revision Control...&lt;/EM&gt;' - create a revision snapshot. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Close all SmartConsole windows (SmartDashboard, SmartView Tracker, SmartView Monitor, etc.). &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Connect with &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk13009" target="_blank" rel="noopener"&gt;GuiDBedit Tool&lt;/A&gt; to Security Management Server / Domain Management Server. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the upper left pane, go to '&lt;STRONG&gt;&lt;EM&gt;Table&lt;/EM&gt;&lt;/STRONG&gt;' - '&lt;STRONG&gt;&lt;EM&gt;Other&lt;/EM&gt;&lt;/STRONG&gt;' - '&lt;STRONG&gt;&lt;EM&gt;ssl_inspection&lt;/EM&gt;&lt;/STRONG&gt;'. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the upper right pane, select the &lt;EM&gt;&lt;STRONG&gt;general_confs_obj&lt;/STRONG&gt;&lt;/EM&gt;. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Press CTRL+F (or go to '&lt;EM&gt;Search&lt;/EM&gt;' menu - '&lt;EM&gt;Find&lt;/EM&gt;') - paste &lt;EM&gt;&lt;STRONG&gt;ssl_min_ver&lt;/STRONG&gt;&lt;/EM&gt; - click on '&lt;EM&gt;Find Next&lt;/EM&gt;'. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the lower pane, right-click on the '&lt;STRONG&gt;&lt;EM&gt;ssl_min_ver&lt;/EM&gt;&lt;/STRONG&gt;' - '&lt;EM&gt;Edit...&lt;/EM&gt;' - choose "&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&lt;EM&gt;TLS1.1&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;" - click on '&lt;EM&gt;OK&lt;/EM&gt;'. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Save the changes: go to '&lt;EM&gt;File&lt;/EM&gt;' menu - click on '&lt;EM&gt;Save All&lt;/EM&gt;'. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Close the GuiDBedit Tool. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Connect with SmartDashboard to Security Management Server / Domain Management Server. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Install the policy onto the relevant Security Gateways. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 12 Dec 2019 19:52:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70346#M14239</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-12-12T19:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70347#M14240</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;For GAIA protal:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;First create a snapshot of your system!!!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;On each machine that runs Gaia OS, configure Gaia Portal &lt;EM&gt;not&lt;/EM&gt; to use TLS 1.0.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important Note:&lt;/STRONG&gt; Before implementing the steps below, save the current Gaia database - log in to Clish and run &lt;EM&gt;&lt;STRONG&gt;save config&lt;/STRONG&gt;&lt;/EM&gt; command.&lt;/P&gt;
&lt;OL type="A"&gt;
&lt;LI&gt;Connect to command line on Gaia OS machine. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Log in to Expert mode. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Backup the current configuration template:&lt;/P&gt;
&lt;STRONG&gt;&lt;EM&gt;[Expert@HostName:0]# cp /web/templates/httpd-ssl.conf.templ /web/templates/httpd-ssl.conf.templ_BKP&lt;/EM&gt;&lt;/STRONG&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Assign the "write" permission to the current configuration template:&lt;/P&gt;
&lt;EM&gt;&lt;STRONG&gt;[Expert@HostName:0]# ls -l /web/templates/httpd-ssl.conf.templ&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;[Expert@HostName:0]# chmod u+w /web/templates/httpd-ssl.conf.templ&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;[Expert@HostName:0]# ls -l /web/templates/httpd-ssl.conf.templ&lt;/STRONG&gt;&lt;/EM&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Edit the current configuration template in Vi editor:&lt;/P&gt;
&lt;STRONG&gt;&lt;EM&gt;[Expert@HostName:0]# vi /web/templates/httpd-ssl.conf.templ&lt;/EM&gt;&lt;/STRONG&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Search for "&lt;STRONG&gt;&lt;EM&gt;SSLProtocol&lt;/EM&gt;&lt;/STRONG&gt;" line. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Change the line&lt;/P&gt;
from
&lt;BLOCKQUOTE&gt;&lt;STRONG&gt;&lt;EM&gt;SSLProtocol -ALL +SSLv3 +TLSv1&lt;/EM&gt;&lt;/STRONG&gt;&lt;/BLOCKQUOTE&gt;
to
&lt;BLOCKQUOTE&gt;&lt;STRONG&gt;&lt;EM&gt;SSLProtocol -ALL +TLSv1.1&lt;/EM&gt;&lt;/STRONG&gt;&lt;/BLOCKQUOTE&gt;
&lt;/LI&gt;
&lt;LI&gt;Save the changes and exit from Vi editor. &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Remove the "write" permission from the current configuration template:&lt;/P&gt;
&lt;EM&gt;&lt;STRONG&gt;[Expert@HostName:0]# ls -l /web/templates/httpd-ssl.conf.templ&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;[Expert@HostName:0]# chmod u-w /web/templates/httpd-ssl.conf.templ&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;[Expert@HostName:0]# ls -l /web/templates/httpd-ssl.conf.templ&lt;/STRONG&gt;&lt;/EM&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Update the current configuration of HTTPD daemon based on the modified configuration template:&lt;/P&gt;
&lt;STRONG&gt;&lt;EM&gt; [Expert@HostName:0]# /bin/template_xlate : /web/templates/httpd-ssl.conf.templ /web/conf/extra/httpd-ssl.conf &amp;lt; /config/active&lt;/EM&gt;&lt;/STRONG&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Restart the HTTPD daemon:&lt;/P&gt;
&lt;EM&gt;&lt;STRONG&gt; [Expert@HostName:0]# tellpm process:httpd2&lt;BR /&gt;[Expert@HostName:0]# tellpm process:httpd2 t &lt;/STRONG&gt;&lt;/EM&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Restart the Gaia machine.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 12 Dec 2019 19:53:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70347#M14240</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-12-12T19:53:10Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70351#M14241</link>
      <description>&lt;P&gt;I appreciate the quick response. It looks like this solution didn't work when done in a lab. Something I did overlook is that when I scan the firewalls my results are showing the certificates used for my VPN. In this case is there a solution to force the SSL VPN cipher to TLS1.1 or higher?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 20:20:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70351#M14241</guid>
      <dc:creator>JG</dc:creator>
      <dc:date>2019-12-12T20:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70359#M14243</link>
      <description>My understanding is the steps Heiko provided should work for that case.&lt;BR /&gt;If not, it's worth a TAC case.</description>
      <pubDate>Fri, 13 Dec 2019 02:59:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70359#M14243</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-13T02:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70368#M14247</link>
      <description>&lt;P&gt;Many internet sites are still using TLS 1.0. If the goal is to disable weak cyphers, you have a much better tool for the purpose than on Heiko mentioned.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is something completely new available on R80.30 for cypher management, called&amp;nbsp;cipher_util.&lt;/P&gt;
&lt;P&gt;See &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126613" target="_self"&gt;sk126613 &lt;/A&gt;for details.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 08:39:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70368#M14247</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-12-13T08:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70370#M14249</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;or, mush better, use cipher_util&lt;/P&gt;</description>
      <pubDate>Mon, 26 Apr 2021 13:29:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70370#M14249</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-04-26T13:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70406#M14262</link>
      <description>I'll have to look into this because I did lab the solution Heiko provided. I will say that I do not want to stop HTTPS inspection from inspecting weak ciphers though. Just want to stop SSL VPNs and anything hitting the management plane of the firewall from using TLS 1.0.</description>
      <pubDate>Fri, 13 Dec 2019 13:16:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70406#M14262</guid>
      <dc:creator>JG</dc:creator>
      <dc:date>2019-12-13T13:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70410#M14263</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/30024"&gt;@JG&lt;/a&gt;&amp;nbsp;Especially then I suggest you look into the utility I have mentioned.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 13:58:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70410#M14263</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-12-13T13:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70417#M14266</link>
      <description>Forgot about that tool &lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;</description>
      <pubDate>Fri, 13 Dec 2019 16:07:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70417#M14266</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-13T16:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70549#M14293</link>
      <description>&lt;P&gt;Dude! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2019 07:59:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70549#M14293</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-12-16T07:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/77057#M15670</link>
      <description>&lt;P&gt;I tried your step and replaced the line in the /web/templates/httpd-ssl.conf.templ, But when we scanned on the interface again for PCI DSS compliance, the error us shown again. Is there any other step that i might have to do to disable tlsv1 on the gateways. The gateways are running R80.10.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 04:13:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/77057#M15670</guid>
      <dc:creator>Nima_Chogyal</dc:creator>
      <dc:date>2020-03-04T04:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/78377#M15969</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/30024"&gt;@JG&lt;/a&gt;, were you able to find a solution?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2020 05:34:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/78377#M15969</guid>
      <dc:creator>jcorbett</dc:creator>
      <dc:date>2020-03-16T05:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/85162#M17153</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;about your procedure for ssl inspection.&lt;/P&gt;&lt;P&gt;i want to ask what will be the impact, actually i need to disable tls 1.0 and tls 1.1 only for specific incoming connection that i do ssl inspection for, so the pen tests will show only tls 1.2 is supported.&lt;/P&gt;&lt;P&gt;but i'm afraid that it will affect also outgoing internet surfing which also goes under ssl inspection, and i wonder, would it reject websites that using tls 1.1 and lower because of that? or it's only between the GW and the internal Pcs that will use only tls 1.2 ?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 07:27:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/85162#M17153</guid>
      <dc:creator>Amir_Arama</dc:creator>
      <dc:date>2020-05-14T07:27:05Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/85174#M17156</link>
      <description>&lt;P&gt;For me the configuration that we usually do on a linux server didnt work at all. My first attempt was that. During the vulnerability testing the customer kept on getting the same result where one of the report came out as failed due to tls1.0 and its vulnerability,im guessing it was called POODLE attack.&lt;/P&gt;&lt;P&gt;For the pen test the option of allowing only tls1.2 from the smartconsole works fine. For me though this helped me resolve the issue for the pen test. And installed a ssl certificate signed by a CA.like go daddy.&lt;/P&gt;&lt;P&gt;Gateway setup was Load sharing mode and version is R80.10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 08:10:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/85174#M17156</guid>
      <dc:creator>Nima_Chogyal</dc:creator>
      <dc:date>2020-05-14T08:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/111035#M20945</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;does this tweaks also apply for the &lt;STRONG&gt;SmartCenter&lt;/STRONG&gt; server???&lt;BR /&gt;Or does it only apply the the Security Gateway?&lt;BR /&gt;cipher_util doesnt run on a SmartCenter, in the Global Properties i have set MIN and MAX TLS version to 1.2 already ...&lt;BR /&gt;the SmartCenter still runs with TLS1.0 and so on ...&amp;nbsp;&lt;BR /&gt;The Security Gateways are now on TLS1.2 after changing the Global Properties ...&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;iam a bit reluctant to tweak around on a live system ...&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;best regards&lt;BR /&gt;Thomas.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 11:34:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/111035#M20945</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2021-02-17T11:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/111038#M20946</link>
      <description>&lt;P&gt;I had to dig through all the available options for hardening HTTPS settings on gateways and management server myself some time ago.&lt;/P&gt;&lt;P&gt;I wrote this table for myself after digging through various SKs, asking TAC and doing lab tests:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="306"&gt;&lt;P&gt;&lt;STRONG&gt;Product&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="305"&gt;&lt;P&gt;&lt;STRONG&gt;TLS Endpoint Scenario&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="306"&gt;&lt;P&gt;&lt;STRONG&gt;Hardening Ciphers using which sk&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="306"&gt;&lt;P&gt;Security Gateway&lt;/P&gt;&lt;/TD&gt;&lt;TD width="305"&gt;&lt;P&gt;Gaia Portal only (httpd2), normal operation&lt;/P&gt;&lt;/TD&gt;&lt;TD width="306"&gt;&lt;P&gt;sk147272 – may need Redo after JHF needed&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="306"&gt;&lt;P&gt;Security Gateway&lt;/P&gt;&lt;/TD&gt;&lt;TD width="305"&gt;&lt;P&gt;Gaia Portal only (httpd2), cpstop&lt;/P&gt;&lt;/TD&gt;&lt;TD width="306"&gt;&lt;P&gt;sk147272 – may need Redo after JHF needed&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="306"&gt;&lt;P&gt;Security Gateway&lt;/P&gt;&lt;/TD&gt;&lt;TD width="305"&gt;&lt;P&gt;Multiportal (httpd2), normal operation&lt;/P&gt;&lt;/TD&gt;&lt;TD width="306"&gt;&lt;P&gt;sk126613 – No Redo after JHF needed&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="306"&gt;&lt;P&gt;Security Gateway&lt;/P&gt;&lt;/TD&gt;&lt;TD width="305"&gt;&lt;P&gt;Multiportal (httpd2), cpstop&lt;/P&gt;&lt;/TD&gt;&lt;TD width="306"&gt;&lt;P&gt;sk147272 – may need Redo after JHF needed&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="306"&gt;&lt;P&gt;Security Management&lt;/P&gt;&lt;/TD&gt;&lt;TD width="305"&gt;&lt;P&gt;Gaia Portal (httpd2)&lt;/P&gt;&lt;/TD&gt;&lt;TD width="306"&gt;&lt;P&gt;sk147272 – may need Redo after JHF needed&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="306"&gt;&lt;P&gt;Security Management&lt;/P&gt;&lt;/TD&gt;&lt;TD width="305"&gt;&lt;P&gt;CPM (Java) (:19009)&lt;/P&gt;&lt;/TD&gt;&lt;TD width="306"&gt;&lt;P&gt;Supports only TLS 1.2 (hardcoded - sk122073) since&lt;/P&gt;&lt;P&gt;•&amp;nbsp;&amp;nbsp;&amp;nbsp; R80.10 Take 278 and on&lt;BR /&gt;•&amp;nbsp;&amp;nbsp;&amp;nbsp; R80.20 Take 149 and on&lt;BR /&gt;•&amp;nbsp;&amp;nbsp;&amp;nbsp; R80.30 Take 195 and on&lt;BR /&gt;•&amp;nbsp;&amp;nbsp;&amp;nbsp; R80.40 and above&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="306"&gt;&lt;P&gt;Security Management&lt;/P&gt;&lt;/TD&gt;&lt;TD width="305"&gt;&lt;P&gt;CPMI (FWM) (:18190)&lt;/P&gt;&lt;/TD&gt;&lt;TD width="306"&gt;&lt;P&gt;Not possible&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The difference between normal operation and cpstop on gateways is purely because of Multiportal. If you stopped Check Point services with cpstop, multiportal deamon is not in service anymore, but Gaia portal is still available. So HTTPS cipher config is falling back from multi portal config to plain httpd config. On gateways without Multiportal, there is no difference.&lt;/P&gt;&lt;P&gt;If anybody has additional infos or corrections for this table, I'm happy to hear from you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 13:50:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/111038#M20946</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2021-02-17T13:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/111157#M20959</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;Thank you Tobias, a good list ...&lt;BR /&gt;&lt;BR /&gt;Question:&lt;BR /&gt;so since this process for the SmartConsole / SIC still remains on TLS1.0 its not possible to remove ALL old TLS versions from the Smartcenter?&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="306"&gt;&lt;P&gt;Security Management&lt;/P&gt;&lt;/TD&gt;&lt;TD width="305"&gt;&lt;P&gt;CPMI (FWM) (:18190)&lt;/P&gt;&lt;/TD&gt;&lt;TD width="306"&gt;&lt;P&gt;Not possible&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Thu, 18 Feb 2021 10:54:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/111157#M20959</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2021-02-18T10:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/111159#M20960</link>
      <description>&lt;P&gt;Most communication between SmartConsole and Security Management is CPM today (and this was hardened), but some features are still relying on old CPMI and so you are right: We cannot disable TLS 1.0 completly on Security Management today.&lt;/P&gt;&lt;P&gt;However: SmartConsole (and SmartDashboard) is using TLS 1.2 these days for CMPI. It is just that the server side on Smart Management would also accept a TLS 1.0 connection and this is what is relevant when doing security assessments/audits.&lt;/P&gt;&lt;P&gt;The full answer I got from TAC last summer was (rephrased and not a direct quote, because I'm not sure if I'm allowed to post it here):&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;For CPMI (FWM) it is possible to change cipher/protocol settings by applying a command with a special flag.&lt;BR /&gt;This was provided over a RFE with Check Point local office and was made available having a specific customer environment been taking into consideration.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;TAC declined to provide this command based on a normal TAC case (backed up by TAC management). If a customer really needs it, a RFE should been raised at local Check Point office.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;They also said, that there was a very good reason this command was not documented anywhere even after the original RFE and it was not meant to be used as a solution for anything just yet.&lt;/P&gt;&lt;P&gt;For me this sounds like: untested, no general support and they do not believe this will work in normal environments. Thats why I have it with "not possible" in my table.&lt;/P&gt;&lt;P&gt;Maybe there will be a day, Check Point R&amp;amp;D finished the replacement of CPMI with CPM &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 11:31:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/111159#M20960</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2021-02-18T11:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS 1.0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/111204#M20968</link>
      <description>&lt;P&gt;Keep in mind most of the security issues with TLS 1.0 don't apply when certificates are used.&lt;BR /&gt;After the initial one-time password initialization, SIC uses certificates for everything.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 18:02:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/111204#M20968</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-02-18T18:02:44Z</dc:date>
    </item>
  </channel>
</rss>

