

Nmap done: 1 IP address (1 host up) scanned in 27. HTTPS/TLSv1.2 Web Server with or without TLS client authentication. Because this situation applies to SChannel, it affects all the SSL/TLS connections to and from the server. These disable SSL 3.0, TLS 1.0, and RC4 protocols. Read data files from: C:\Program Files (x86)\Nmap An example of disabling old protocols by using SChannel registry keys would be to configure the values in registry subkeys in the following list. If an SSPI app requests to use TLS 1.0, it will be denied. To disable TLS 1.0 for Client, change the DWORD value to 0. After you have created the entry, change the DWORD value to 1. This entry does not exist in the registry by default. | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A To enable the TLS 1.0 protocol, create an Enabled entry in either the Client subkey.

I realized after my question that our security report didn't call out FMC as using TLSv1.0/TLSv1.2, I just ran an nmap scan and It seems it's only using TLSv1.2 (FMC7.0.5). Client connects to the server and TLS/SSL encryption is switched on implicitly as soon as the channel is established. Thanks Marvin! Always nice to hear from a legend! That stinks about platform settings not affecting the mgmt interface's ciphers (being unable to disable TLSv1.0/TLSv1.1. Steps to Reproduce Clarifying Information Older versions of WSFTP Server may have SSL 3, TLS 1.0 and TLS 1.1 enabled by default Please see Enable TLS FTPS (Implicit SSL) connections over port 990 will be encrypted at connection.
