Skip to main content
NetApp Response to Russia-Ukraine Cyber Threat
In response to the recent rise in cyber threat due to the Russian-Ukraine crisis, NetApp is actively monitoring the global security intelligence and updating our cybersecurity measures. We follow U.S. Federal Government guidance and remain on high alert. Customers are encouraged to monitor the Cybersecurity and Infrastructure Security (CISA) website for new information as it develops and remain on high alert.
NetApp Knowledge Base

How to harden ONTAP 9 TLS configuration

Views:
4,665
Visibility:
Public
Votes:
2
Category:
ontap-9
Specialty:
core
Last Updated:

Applies to

ONTAP 9

Description

This article will guide you through disabling TLS versions and allowing only strong ciphers of 128 bits or higher.

Many security scanners flag ONTAP as not compliant to an established security baseline when scanning an ONTAP cluster for SSL vulnerabilities or weaknesses. A security baseline is established by an Information Security team to define the allowed minimum security configuration of a server that should exist within a corporate network. A security baseline will often include the version of Transport Layer Security- TLS, that a server should provide when communicating with client hosts. This article will guide you through allowing only the strongest version of TLS currently available within ONTAP 9 and strong ciphers of 128 bits or greater with which to secure communication with clients and applications granted the HTTP application access to ONTAP.

 

 

Scan to view the article on your device
CUSTOMER EXCLUSIVE CONTENT

Registered NetApp customers get unlimited access to our dynamic Knowledge Base.

New authoritative content is published and updated each day by our team of experts.

Current Customer or Partner?

Sign In for unlimited access

New to NetApp?

Learn more about our award-winning Support