Skip to main content
NetApp Knowledgebase

How to harden ONTAP 9 TLS configuration

Views:
1,433
Visibility:
Public
Votes:
0
Category:
ontap-9
Specialty:
core
Last Updated:

Applies to

ONTAP 9

Description

This article will guide you through disabling TLS versions and allowing only strong ciphers of 128 bits or higher.

Many security scanners flag ONTAP as not compliant to an established security baseline when scanning an ONTAP cluster for SSL vulnerabilities or weaknesses. A security baseline is established by an Information Security team to define the allowed minimum security configuration of a server that should exist within a corporate network. A security baseline will often include the version of Transport Layer Security- TLS, that a server should provide when communicating with client hosts. This article will guide you through allowing only the strongest version of TLS currently available within ONTAP 9 and strong ciphers of 128 bits or greater with which to secure communication with clients and applications granted the HTTP application access to ONTAP.

 

 

CUSTOMER EXCLUSIVE CONTENT

Registered NetApp customers get unlimited access to our dynamic Knowledge Base.

New authoritative content is published and updated each day by our team of experts.

Current Customer or Partner?

Sign In for unlimited access

New to NetApp?

Learn more about our award-winning Support