I have been sent a report listing various public facing services on our firewalls and whether they are allowing TLS1.0 and TLS1.1.
For the URL that clients use to connect to use the Remote Access vpn it has come back as allowing 1.0 and 1.1
Risk Vector | Finding Identifier | Last Seen | Grade | Attributed To | Finding Severity |
SSL Configurations | remoteaccess.mycompany.com:443 | 27/03/2025 | BAD | My Company Inc. | severe |
Asset Importance | Assets | Details |
critical | remoteaccess.mycompany.com | Allows insecure protocol: TLSv1.0; Allows insecure protocol: TLSv1.1 |
Presumably the client, when it connects initially, wouldn't be using 1.0 or 1.1. But beyond that I don't know what I can do to get rid of the vulnerability. I am not sure if the vulnerability even is to do with the RemoteAccess service, it is just that it uses the same public IP as the firewalls.
What could I do on the firewall to remove this vulnerability?
The firewalls are VSX running r81