Managing the TLS version
You can disable TLS 1.0/1.1, and enable TLS 1.2 on all appliances, S-TAP agents, CAS and GIM clients.
About this task
This feature was introduced in v10.1.4.
To increase the security of the Guardium system, from Guardium release v10.1.4, communications protocols TLS 1.0/1.1 can be optionally disabled. Disabling TLS 1.0/1.1 results in only the TLS 1.2 protocol being enabled. Communications may be less secure when using TLS 1.0/1.1.
You must disable TLS 1.0/1.1 from the Central Manager and/or standalone unit using the CLI. Your Guardium appliances, S-TAP agents, CAS and GIM clients must be at specific versions to enable this feature.
The disablement of TLS 1.1 automatically checks to make sure managed units and S-TAPs are at specific versions, but cannot check CAS client versions. Customers using CAS need to make sure their CAS clients are at version 10.1.4 and their database servers have Java 7 enabled. Lack of doing this will result in the inability to see CAS connections to database servers.
You must also make sure all managed units have version 10.1.4 installed, and GIM Clients and S-TAPs are at a minimum version of 10.1.2. Failure to meet all requirements will mean that TLS 1.0/1.1 will not be disabled.
To get information about, and to disable TLS1.0/1.1 on all units in a managed environment, (Central Manager, Aggregator, Managed units), the following commands should be run on the Central Manager.
Procedure
grdapi get_secured_protocols_info
Running this command from a
Central Manager to propagate down to all managed units. The system outputs the enabled protocols
(TLS 1.0/1.1 and TLS 1.2) and indicates if the TLS 1.0/1.1 protocols can be disabled. Error codes
1000+ indicate an issue with a component that needs to be addressed by the admin before TLS 1.0/1.1
can be disabled. Messages are displayed indicating which component(s) do not meet the requirements
for disabling TLS 1.0/1.1. Warning messages are generated for managed units that are offline or
unreachable. Offline units must be managed individually when they come back online.grdapi disable_deprecated_protocols
Running this command from a
Central Manager to propagate down to all managed units. This command firsts run the version checks
described above. If the requirements for disablement are met, then this command changes the
configuration settings for each service on the Central Manager as well as all managed units. If the
requirements for disablement are not met, then the system indicates that the deprecated protocols
are enabled and must be kept enabled until all managed units and/or components are
upgraded.