Forum Discussion
cipher suites
Trying to remediate the F5 management vulnerabilities. removal ofTLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C For tls1.0 and tls1.1
list /sys httpd ssl-ciphersuite Any guidance?
thanks
You can remove specific suit or protocol like this: HIGH:!TLSv1_2!
For detail, go thru the following articles:
K17370: Configuring the cipher strength for SSL profiles (12.x - 13.x) https://support.f5.com/csp/article/K17370
K13163: SSL ciphers supported on BIG-IP platforms (11.x - 13.x) https://support.f5.com/csp/article/K13163
You may try something like this and check the resultant list: tmm --clientciphers 'HIGH:!TLSv1_1:!TLSv1:!DTLSv1:!sslv3'
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com