- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Re: weak ciphers
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
weak ciphers
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
hi @G_W_Albrecht ,
i have succesfully completed the vulnerability mitigations based on the sk147272 and cipher_util tool
thanks for the response guys
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You already found the solution, sk126613. Run cipher_util and remove the weak ciphers. The SK has full instructions on how to do that.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
hell
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Wait a moment, you are running R80.30? It is out of support for a while now.
Concerning your question, you really need to explain what you are trying to achieve. Removing ciphers from SSL Inspection will lead to a situation when traffic will not be inspected if a website only offers weak ciphers to use.
What are you trying to achieve in the first place? Harden the system? Which part of the functionalities?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
apologies to val , here i have attached the weak ciphers i really don;t know where i need to disable this and this is my first time using the cipher_utill
actually that was my lab environment R80.30 ,the original vulnerability observed by R81
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Which vulnerability? You are not making much sense. Please elaborate, what do you want to achieve here?
What is the tool reporting week filters?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
hello
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Multi Portal as this is always enabled ! See about the process and how to restart which services here: sk178165: The configuration made with the 'cipher_util' on a Security Gateway is not applied immedia...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
the tools QUALYS SSl labs
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I assume it is testing the SSL capabilities of your GW. Choose the Multi-portal, remove weak filters and check if the issue is resolved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Do you have SSL Inspection enabled at all ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
According to the output above you do not have SSL Inspection for TP enabled. Open the GW object and select HTTPS inspection in left column - Enable HTTPS inspection is unchecked.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Did you succeed to disable the weak ciphers yet ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
hi @G_W_Albrecht ,
i have succesfully completed the vulnerability mitigations based on the sk147272 and cipher_util tool
thanks for the response guys
