<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Regarding the issue of ZD1200 TLS SSL in Wireless Questions and Best Practices</title>
    <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109703#M2746</link>
    <description>&lt;P&gt;Question 1:&lt;BR /&gt;&lt;A href="https://support.ruckuswireless.com/documents/5698:" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/documents/5698:&lt;/A&gt;&amp;nbsp;"FTP will be disabled after upgrading to ZoneDirector 10.5.1.0.279, regardless of whether it was enabled or disabled prior to the upgrade"&lt;BR /&gt;You can check for yourself with e.g. nmap.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;$ nmap -sV -p 21 192.168.0.2

PORT   STATE  SERVICE VERSION
21/tcp closed ftp&lt;/LI-CODE&gt;&lt;P&gt;Question 2:&lt;BR /&gt;From the ZoneDirector CLI:-&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;ruckus&amp;gt; enable
ruckus# debug
ruckus(debug)# no support-tls 1.0-1.1
Are you sure you want to change whether support TLSv1.0 and TLSv1.1, If yes, it will reboot ZoneDirector.[Y/n]
ruckus(debug)#&lt;/LI-CODE&gt;&lt;P&gt;After a reboot you will have only TLSv1.2.&lt;BR /&gt;You can check this yourself with e.g. nmap.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;$ nmap --script ssl-enum-ciphers -p 443 192.168.0.2

PORT      STATE SERVICE
443/tcp   open  https
| ssl-enum-ciphers:
|   TLSv1.2:
|     ciphers:
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|     compressors:
|       NULL
|     cipher preference: server
|     warnings:
|       Forward Secrecy not supported by any cipher
|_  least strength: A&lt;/LI-CODE&gt;&lt;P&gt;(I don't show it, but you can also check ports 9998 and 11443 &amp;amp; see they also support only TLSv1.2).&lt;/P&gt;&lt;P&gt;Question 3:&lt;BR /&gt;You're out of luck here. You can see in the nmap output from Q2: "&lt;STRONG&gt;warnings:&amp;nbsp;Forward Secrecy not supported by any cipher&lt;/STRONG&gt;". This means it is impossible to disable weak KBC algorithms and still use the ZoneDirector.&lt;/P&gt;</description>
    <pubDate>Wed, 17 Sep 2025 22:55:23 GMT</pubDate>
    <dc:creator>ms264556</dc:creator>
    <dc:date>2025-09-17T22:55:23Z</dc:date>
    <item>
      <title>Regarding the issue of ZD1200 TLS SSL</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109653#M2745</link>
      <description>&lt;P&gt;My model is ZD1200&lt;BR /&gt;I have upgraded to version 10.5.1.0 duild 282&lt;BR /&gt;Have the following issues been resolved in this version&lt;BR /&gt;Question 1 "Disable FTP plaintext authentication"&lt;BR /&gt;Question 2: Disable SSLv2, SSLv3, and TLS 1.0. Enable TLS 1.2 "&lt;BR /&gt;Question 3 "Disable any weak KBC algorithm in TLS configuration"&lt;BR /&gt;What command should I use to check that these issues have been fixed?&lt;BR /&gt;Alternatively, you can provide me with an official explanation that these issues have been fixed since 10.5.1.0.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Sep 2025 08:47:50 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109653#M2745</guid>
      <dc:creator>lanwei</dc:creator>
      <dc:date>2025-09-17T08:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the issue of ZD1200 TLS SSL</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109703#M2746</link>
      <description>&lt;P&gt;Question 1:&lt;BR /&gt;&lt;A href="https://support.ruckuswireless.com/documents/5698:" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/documents/5698:&lt;/A&gt;&amp;nbsp;"FTP will be disabled after upgrading to ZoneDirector 10.5.1.0.279, regardless of whether it was enabled or disabled prior to the upgrade"&lt;BR /&gt;You can check for yourself with e.g. nmap.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;$ nmap -sV -p 21 192.168.0.2

PORT   STATE  SERVICE VERSION
21/tcp closed ftp&lt;/LI-CODE&gt;&lt;P&gt;Question 2:&lt;BR /&gt;From the ZoneDirector CLI:-&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;ruckus&amp;gt; enable
ruckus# debug
ruckus(debug)# no support-tls 1.0-1.1
Are you sure you want to change whether support TLSv1.0 and TLSv1.1, If yes, it will reboot ZoneDirector.[Y/n]
ruckus(debug)#&lt;/LI-CODE&gt;&lt;P&gt;After a reboot you will have only TLSv1.2.&lt;BR /&gt;You can check this yourself with e.g. nmap.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;$ nmap --script ssl-enum-ciphers -p 443 192.168.0.2

PORT      STATE SERVICE
443/tcp   open  https
| ssl-enum-ciphers:
|   TLSv1.2:
|     ciphers:
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|     compressors:
|       NULL
|     cipher preference: server
|     warnings:
|       Forward Secrecy not supported by any cipher
|_  least strength: A&lt;/LI-CODE&gt;&lt;P&gt;(I don't show it, but you can also check ports 9998 and 11443 &amp;amp; see they also support only TLSv1.2).&lt;/P&gt;&lt;P&gt;Question 3:&lt;BR /&gt;You're out of luck here. You can see in the nmap output from Q2: "&lt;STRONG&gt;warnings:&amp;nbsp;Forward Secrecy not supported by any cipher&lt;/STRONG&gt;". This means it is impossible to disable weak KBC algorithms and still use the ZoneDirector.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Sep 2025 22:55:23 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109703#M2746</guid>
      <dc:creator>ms264556</dc:creator>
      <dc:date>2025-09-17T22:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the issue of ZD1200 TLS SSL</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109718#M2748</link>
      <description>&lt;P&gt;tkank you&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked from the CLI that my firmware does not have TLS1.2, only 1.0 and 1.1, so I turned off 1.0. Can the problem be solved by only turning on 1.1 or above.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ruckus(debug)#show tls&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TLs= Support Ts 1.0 and Ts 1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ruckus(debug)#no support-tls 1.0Are you sure you want to change whether support TLSv1.0,If yes, it will reboot &amp;amp;oneDirector.[Y/n]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ruckus (debug)#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2025 09:31:23 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109718#M2748</guid>
      <dc:creator>lanwei</dc:creator>
      <dc:date>2025-09-18T09:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the issue of ZD1200 TLS SSL</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109719#M2749</link>
      <description>Assuming you're on 10.5.1 then the syntax I gave you is correct &amp;amp; will result in TLSv1.2 being the only supported cipher</description>
      <pubDate>Thu, 18 Sep 2025 09:34:05 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109719#M2749</guid>
      <dc:creator>ms264556</dc:creator>
      <dc:date>2025-09-18T09:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the issue of ZD1200 TLS SSL</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109720#M2750</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I use CLI, why can't I see that my firmware supports TLS 1.2 in show tls? Only 1.0 and 1.1.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2025 09:46:20 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109720#M2750</guid>
      <dc:creator>lanwei</dc:creator>
      <dc:date>2025-09-18T09:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the issue of ZD1200 TLS SSL</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109721#M2751</link>
      <description>That command is for disabling deprecated ciphers. Forcing clients to use insecure ciphers makes no sense, which is why I assume the command doesn't allow it.&lt;BR /&gt;&lt;BR /&gt;I gave you an nmap command which you can use to prove that TLS 1.2 is the only available cipher.</description>
      <pubDate>Thu, 18 Sep 2025 10:24:56 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109721#M2751</guid>
      <dc:creator>ms264556</dc:creator>
      <dc:date>2025-09-18T10:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding the issue of ZD1200 TLS SSL</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109722#M2752</link>
      <description>&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;Joining my AC IP is 192.168.1.1, and I am executing it on AC's CLI&lt;BR /&gt;Can nmap - script ssl-enum-ciphers - p 443 192.168.1.1 obtain the following information?&lt;BR /&gt;PORT STATE SERVICE&lt;BR /&gt;443/tcp open https&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.2:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| cipher preference: server&lt;BR /&gt;| warnings:&lt;BR /&gt;| Forward Secrecy not supported by any cipher&lt;BR /&gt;|_ least strength: A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2025 10:54:48 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/Regarding-the-issue-of-ZD1200-TLS-SSL/m-p/109722#M2752</guid>
      <dc:creator>lanwei</dc:creator>
      <dc:date>2025-09-18T10:54:48Z</dc:date>
    </item>
  </channel>
</rss>

