In Wildfire how do we disable weak TLS ciphers?

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.
Palo Alto Networks Approved
Palo Alto Networks Approved
Community Expert Verified
Community Expert Verified

In Wildfire how do we disable weak TLS ciphers?

L1 Bithead

Nessus scanning is picking up TCP/443 TLS v1.0 and v1.1 on our WildFire (WF-500) appliances.

 

Is there a way to turn off TLS v1.0 and v1.1 on the WildFire ?

 

Below is the Nessus scanner notification.

--------------------------------------------------------------------------------
Policy Violation 443/tcp Nessus ID: 56984
--------------------------------------------------------------------------------
Synopsis :
The remote service encrypts communications.

Description :
This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.

See also :



Solution :
n/a

Risk factor :
None / CVSS Base Score :0.0

Prioritized Risk :
None (VPR: n/a / CVSS v3: None / CVSS v2: None)

Plugin output :

This port supports TLSv1.0/TLSv1.1/TLSv1.2.

1 REPLY 1

L6 Presenter

Hello,

 

Please see the article below and set the min TLS version you want:

 

https://docs.paloaltonetworks.com/wildfire/9-1/wildfire-admin/set-up-and-manage-a-wildfire-appliance...

 

 

---

 

 

 

    • PAN-OS 8.0 and later releases support TLS 1.2 and later TLS versions only. You must set the max version to TLS 1.2 or max.
      admin@WF-500#
      set shared ssl-tls-service-profile
      <name>protocol-settings min-version {tls1-0 | tls1-1 | tls1-2}
      admin@WF-500#
      set shared ssl-tls-service-profile
      <name>protocol-settings max-version {tls1-0 | tls1-1 | tls1-2 | max}
    • Configure secure server communication on the WildFire appliance.
      • Set the SSL/TLS profile. This SSL/TLS service profile applies to all SSL connection between WildFire and client devices.
        admin@WF-500#
        set deviceconfig setting management secure-conn-server ssl-tls-service-profile
        <ssltls-profile>
         
         
         
         

         

    •  
  • 1173 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!