02-16-2022 11:08 AM
Hi - I have started getting a security error when navigating to my ZD1100 or APs (7372s) recently. From my understanding I may be able to disable the offending TLS versions in my system, but I do not know how under this firmware. Is it possible?
I am not able to upgrade my firmware beyond this build.
02-16-2022 12:22 PM
Ruckus > en
Ruckus (debug)#no tlsv1
02-16-2022 02:09 PM
Hi and thank you very much for checking on this post for me - I appreciate it!
Here is the sequence I encounter when I attempt that:
Welcome to the Ruckus Wireless ZoneDirector 1100 Command Line Interface
You have all rights in this mode.
ruckus(debug)# no tlsv1
Invalid command "no". The command is either unrecognized or incomplete. To view a list of commands that you can run from this context, type '?' or 'help'.
(btw I dont know how to make the command line report the build, but here is a screen shot of it from the web interface to show the version number)
03-03-2022 02:21 AM
9.8 doesn't do TLS 1.2, so disabling 1.0 & 1.1 probably isn't a thing.
I have a Firefox 40 install I keep specifically for logging into pre-TLS1.2 equipment.
04-05-2022 09:15 AM
your EOS ZD1100 does only support 9.10.2 firmware path. There is the last release in 2021. So chances might be high that there is something that fixes your issue. If you upgrade take 188.8.131.52.130.
Resolved Issues in Build 73
• Enhanced 802.1X authentication scalability and performance on ZoneDirector. [ER-6754]
• Resolved an AP kernel memory leak issue that could eventually lead to watchdog timeout reboots. [ER-3544/ER-6666]
• Added CLI command to disable/enable TLS1.0. [ER-6623]
PS: Your APs are even Fragattak unsecure.
Resolved Issues in Build 58
• Resolved an issue related to the WPA KRACK vulnerability. For information on security incidents and responses, see https://
This release fixes multiple vulnerabilities (also known as KRACK vulnerabilities) discovered in the four-way handshake stage of the
WPA protocol. The Common Vulnerabilities and Exposures (CVE) IDs that this release addresses include: