I'm trying to track down how to get legacy client authentication to disable SSLv2/v3 TLS1.0 and TLS1.1. I found
sk102989 - Check Point response to the POODLE Bites vulnerability (CVE-2014-3566)
and
sk100584 - Cipher strength for Client Authentication feature is under 128-bit and there is no way to control which SSL version to use
both basically say to set ASSL_NO_SSLV2=1 and ASSL_NO_SSLV3=1 (how they say to set them is a little different but end result looks the same).
However sk100584 also says how to disable TLS1.0 (but not TLS 1.1 ?) but also says you can't disable all three.
I'm a little confused what is the proper way to disable the insecure protocols here. My goal would be to only support TLS1.2 for client auth. Yes, I know captive portal would be better but we're not in a place where we can move everything yet.