Cisco ASA: Configure TLSv1.2 and disable TLSv1.1 for Security Enhancement

For configuring TLS v1.2, the ASA should run software version 9.3(2) or later.
In earlier versions of ASA, TLS 1.2 is not supported. If you are running the old version, it’s time to upgrade.
But before that i will show you the config prior to the change. I am running ASA version 9.6.1
asa tlsv1.2
Now ,set the server-version to tlsv1.2, though ASA supports version tlsv1.1, its always better to configure the connection to more secure. Server here in the sense, the ASA will be act as the server and the client will connect to the ASA.
    #ssl server-version tlsv1.2
set the client-version to tlsv1.2, if required.
    #ssl client-version tlsv1.2
ssl cipher command in ASA offers 5 predefined security levels and an additional custom level.
    #ssl cipher tlsv1.2 high
we can see the setting of each cipher levels using #show ssl cipher command.
asa tlsv1.2
asa tlsv1.2
Now set the DH group to 24, which is the strongest offered as of now in the ASA.
    #ssl dh-group group24
asa tlsv1.2
And that it. You can verify it by accessing the ASA/ASDM.
once again check the config using #show ssl command.
You can see the connection will now negotiate to TLSv1.2.
asa tlsv1.2

Was this article helpful?

Related Articles

Leave A Comment?