<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall he is covering under some vulnerability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-he-is-covering-under-some-vulnerability/m-p/49683#M36593</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Satish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you talk about SSL there are two things.&lt;/P&gt;&lt;P&gt;1. SSL to PANW box&lt;/P&gt;&lt;P&gt;2. SSL passthrough from PANW box&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently there is no feature to disable/enable supported SSL version. FIPS mode doesnt support weak cipher, however FIPS mode has its own issues. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can not change SSL behavior as long as client/server agrees on ciphers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Jul 2014 16:43:01 GMT</pubDate>
    <dc:creator>hshah</dc:creator>
    <dc:date>2014-07-28T16:43:01Z</dc:date>
    <item>
      <title>Firewall he is covering under some vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-he-is-covering-under-some-vulnerability/m-p/49682#M36592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need suggestion &lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-IN" style="color: #44546a;"&gt;Actually when auditor running Vulnerability scaner tool then on Firewall he is covering under some vulnerability&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-IN" style="font-size: 10.0pt; font-family: 'Arial','sans-serif';"&gt;&amp;gt; Upgrade to the latest version of OpenSSL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-IN" style="font-size: 10.0pt; font-family: 'Arial','sans-serif';"&gt;&amp;gt;&amp;nbsp; Use a strong key&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-IN" style="font-size: 10.0pt; font-family: 'Arial','sans-serif';"&gt;&amp;gt;&amp;nbsp; Disable SSL support for weak ciphers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-IN" style="color: #44546a;"&gt;So for the current version of Firewall customer has 6.0 version software then is this version is free from vulnerability, can you check and suggest how to come out from above theree points detected by scan tool&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jul 2014 15:59:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-he-is-covering-under-some-vulnerability/m-p/49682#M36592</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2014-07-28T15:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall he is covering under some vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-he-is-covering-under-some-vulnerability/m-p/49683#M36593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Satish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you talk about SSL there are two things.&lt;/P&gt;&lt;P&gt;1. SSL to PANW box&lt;/P&gt;&lt;P&gt;2. SSL passthrough from PANW box&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently there is no feature to disable/enable supported SSL version. FIPS mode doesnt support weak cipher, however FIPS mode has its own issues. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can not change SSL behavior as long as client/server agrees on ciphers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jul 2014 16:43:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-he-is-covering-under-some-vulnerability/m-p/49683#M36593</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-07-28T16:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall he is covering under some vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-he-is-covering-under-some-vulnerability/m-p/49684#M36594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hardik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is that if every this is oky then why scaner are detected &lt;SPAN style="color: #44546a; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;theree points.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Satish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jul 2014 17:13:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-he-is-covering-under-some-vulnerability/m-p/49684#M36594</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2014-07-28T17:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall he is covering under some vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-he-is-covering-under-some-vulnerability/m-p/49685#M36595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Satish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seem scanner has detected SSL related vulnerability, please share vulnerability with us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can provide more precise information after getting vulnerability.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jul 2014 17:37:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-he-is-covering-under-some-vulnerability/m-p/49685#M36595</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-07-28T17:37:13Z</dc:date>
    </item>
  </channel>
</rss>

