Thursday, February 14, 2019

Cisco ASA - Set to FIPS compliant to disable 3DES

We have an ASA running asa991-smp-k8.bin that is also setup as a VPN device for AnyConnect clients.

I have to remediate some Alert Logic scan issues and one of them is that 3DES is enabled on the ASA and it should be set to a higher one.

The current encryption Cipher Security Level is set to medium and I would like to ask what I need to consider before I set it to FIPS so 3DES is disabled?

The minimum SSL version for the security appliance to negotiate as a server is set to TLS V1.2

Minimum As a client is set TLSV1



No comments:

Post a Comment