- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
12-08-2021 06:00 AM
Hi Team,
I have few queries to be addressed.
We have changed the SSL/TLS version using CLI to TLS 1.2 but when we run the scan we can see TLS 1.1 is also running at the back-end. We need to check which SSL/TLS version is running using CLI of the Firewall.
What command needs to be used to check the current TLS version of the firewall? in CLI
Secondly:
We need to know which SSL/TLS cipher is recommended. From our security team point of view we need to disable the below mentioned ciphers (DH & RSA) algorithms. If we disable these two will there be any issue?
How to disable them? Steps and commands to disable through CLI?
Will the firewall work intended even after disabling DH and RSA?
What are the recommended SSL/TLS cipher for the firewall?
Thirdly:
We need to know what is the current SSH Cipher its taking for the SSH of the firewall how to find which one is currently being used.
Let me know on the above
Cheers!
12-08-2021 09:19 AM
Hello,
Check out these articles as they may have the solution you are looking for.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBGLCA4
Regards,
12-10-2021 12:28 AM
I need the recommended SSH ciphers and command to check which SSH cipher algorithm is being used.
12-10-2021 12:14 PM
Hello,
Its in this article.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG
Regards,
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!