<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security Vulnerblilties on old FAS 6080 in ONTAP Hardware</title>
    <link>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156888#M10160</link>
    <description>&lt;P&gt;Hope someone can assist... I never had to worry about these things but suddenly our security team had a dream. None the less...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have two (very) old FAS 6080 both running 8.2.5 7-mode. I managed to get the one to show no vulnerabilities to the Sec team but the other still presents two issues:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;SSL Medium Strength Cipher Suites Supported (SWEET32)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;SSL RC4 Cipher Suites Supported (Bar Mitzvah)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The options list for both arrays are the same however the one still have "issues"&lt;/P&gt;
&lt;P&gt;I have disabled anything SSL that I can see also. Happy to manage it via SSH. And yes, we have been trying to get the business to migrate their data for years...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can I get rid of these?&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jun 2025 11:05:42 GMT</pubDate>
    <dc:creator>debstef</dc:creator>
    <dc:date>2025-06-04T11:05:42Z</dc:date>
    <item>
      <title>Security Vulnerblilties on old FAS 6080</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156888#M10160</link>
      <description>&lt;P&gt;Hope someone can assist... I never had to worry about these things but suddenly our security team had a dream. None the less...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have two (very) old FAS 6080 both running 8.2.5 7-mode. I managed to get the one to show no vulnerabilities to the Sec team but the other still presents two issues:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;SSL Medium Strength Cipher Suites Supported (SWEET32)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;SSL RC4 Cipher Suites Supported (Bar Mitzvah)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The options list for both arrays are the same however the one still have "issues"&lt;/P&gt;
&lt;P&gt;I have disabled anything SSL that I can see also. Happy to manage it via SSH. And yes, we have been trying to get the business to migrate their data for years...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can I get rid of these?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 11:05:42 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156888#M10160</guid>
      <dc:creator>debstef</dc:creator>
      <dc:date>2025-06-04T11:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerblilties on old FAS 6080</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156896#M10164</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Some pointers, not sure if you had access to this.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;SWEET32:&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://security.netapp.com/advisory/ntap-20160915-0001/" target="_blank"&gt;https://security.netapp.com/advisory/ntap-20160915-0001/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;First Fixed in Release:&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://mysupport.netapp.com/NOW/download/software/ontap/8.2.5P2/" target="_blank"&gt;https://mysupport.netapp.com/NOW/download/software/ontap/8.2.5P2/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;BR /&gt;Data ONTAP operating in 7-Mode: Beginning with version 8.2.5 the "high_security.enable" option will enable only the TLS v1.1 and v1.2 protocols which do not support the 3DES-CBC cipher. If you cannot patch Ontap to P2 at this time, then follow this workaround.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By-default it is 'off', so turn it on:&lt;BR /&gt;filer&amp;gt; options high_security.enable on&lt;/P&gt;
&lt;P&gt;------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;RC4:&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://security.netapp.com/advisory/ntap-20150122-0001/" target="_blank"&gt;https://security.netapp.com/advisory/ntap-20150122-0001/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;First Fixed in Release:&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://mysupport.netapp.com/NOW/download/software/ontap/8.2.3/" target="_blank"&gt;https://mysupport.netapp.com/NOW/download/software/ontap/8.2.3/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;BR /&gt;Data ONTAP operating in 7-Mode beginning with version 8.2.3: the command 'options rc4.enable off' will disable RC4 cipher support in the TLS and SSL protocols over HTTPS.&amp;nbsp; &lt;EM&gt;You are already on fixed version, you just need to turn it off.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By-default it is 'on', turn it off:&lt;BR /&gt;filer&amp;gt;options rc4.enable off&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 12:14:16 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156896#M10164</guid>
      <dc:creator>Ontapforrum</dc:creator>
      <dc:date>2020-06-11T12:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerblilties on old FAS 6080</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156902#M10166</link>
      <description>&lt;P&gt;Thanks for your feedback!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I managed to get get high_security enabled on one node, the other complains:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;FAS6080&amp;gt; options high_security.enable on&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;For enabling high-security option, it is required to have latest secure keys for SSL and SSH.&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;System has detected the presence of supported SSL key which can support high_security protocols.&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Would you still like to re-generate the SSL keys [no]: n&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Some vfilers do not have Required SSH Keys.&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Generate Required ECDSA and ED25519 keys using Secure admin setup on below vfilers to enable High Security.&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Vfiler list : vfiler0,.&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Could not enable high_security option. Please check available secure keys using "keymgr list key" command.&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;FAS6080&amp;gt; keymgr list key&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Existing key file(s):&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Name Type Bits Size Last Modified&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;secureadmin.pem ECDSA NA 367 Jun 11 15:17:14 SAST 2020&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;secureadmin_bak.pem ECDSA NA 367 Jun 11 15:13:09 SAST 2020&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;dh_secureadmin.pem DH 1024 578 Jun 9 09:13:51 SAST 2020&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;rc4.enable switched to off on both&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 13:24:36 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156902#M10166</guid>
      <dc:creator>debstef</dc:creator>
      <dc:date>2020-06-11T13:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerblilties on old FAS 6080</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156903#M10167</link>
      <description>&lt;P&gt;No worries.&amp;nbsp; Interesting one Node is able to enable&amp;nbsp; it, I believe it's a HA Pair, so could you compare the keymgr on both nodes ?&amp;nbsp; bits &amp;amp; size, what could be different here ?&amp;nbsp; Never dealt wit this security option in 7-mode.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 14:08:40 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156903#M10167</guid>
      <dc:creator>Ontapforrum</dc:creator>
      <dc:date>2020-06-11T14:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerblilties on old FAS 6080</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156917#M10168</link>
      <description>&lt;P&gt;Maybe you need to remove that Diffie-Hellman (DH) key...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a KB article on this option, but it hasn't been migrated to the new KB system, yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is some relevant parts:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 153px; top: 1168.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.03506);"&gt;When high_security.enable is set to ON:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="left: 185px; top: 1192.99px; font-size: 13px; font-family: sans-serif; transform: scaleX(0.998716);"&gt;SSH: Will stop advertising weaker ciphers, KEX and MAC algorithms – These MACs will not be advertised: all hmac-&lt;/SPAN&gt;&lt;SPAN style="left: 185px; top: 1215.99px; font-size: 13px; font-family: sans-serif; transform: scaleX(0.998584);"&gt;md5 series, hmac-ripemd series, umac series and kex: diffie-hellman-group1-sha1, curve25519&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="left: 185px; top: 102.99px; font-size: 13px; font-family: sans-serif; transform: scaleX(0.998518);"&gt;SSL: ssl.v2.enable and ssl.v3.enable will be disabled&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="left: 185px; top: 129.99px; font-size: 13px; font-family: sans-serif; transform: scaleX(0.998848);"&gt;TLS: TLS.v1.1 and TLSv1.2 will be enabled and internally negotiate TLSv1.1, TLSv1.2 only &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="left: 185px; top: 156.99px; font-size: 13px; font-family: sans-serif; transform: scaleX(0.998801);"&gt;Secure LDAP: should negotiate according to value of TLS setting (tls.v1_1.enable/tls.v1_2.enable) &lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="left: 153px; top: 223.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.03984);"&gt;How to enable&lt;/SPAN&gt;&lt;SPAN style="left: 259px; top: 223.5px; font-size: 16px; font-family: sans-serif;"&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 153px; top: 271.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.02699);"&gt;In order to enable the high_security option, all the Vfilers must have the required ECDSA and ED25519 &lt;/SPAN&gt;&lt;SPAN style="left: 153px; top: 295.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.02734);"&gt;keys generated using Secure admin setup. If any Vfilers do not have the required SSH keys, &lt;/SPAN&gt;&lt;SPAN style="left: 153px; top: 319.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.04271);"&gt;then high security options cannot be enabled. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 153px; top: 391.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.03074);"&gt;Consider the following when stronger SSH keys are required:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="left: 186px; top: 439.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.05019);"&gt;When prompted for the key size, input the number, don’t accept the default in brackets, even if &lt;/SPAN&gt;&lt;SPAN style="left: 153px; top: 463.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.03812);"&gt;the default is showing the desired key size&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="left: 193px; top: 487.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.01278);"&gt;For ssh1 protocol, key size must be between 1024 and 16384 bits&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="left: 193px; top: 511.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.0152);"&gt;For ssh2 protocol, RSA key size must be between 1024 and 16384 bits&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="left: 153px; top: 535.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.00756);"&gt;DSA valid key size is 1024 bits&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="left: 153px; top: 559.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(0.995899);"&gt;ECDSA valid key sizes are 256, 384, and 521 bits&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="left: 186px; top: 583.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.00876);"&gt;ED25519 key size must be between 256 and 16384 bits&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="left: 186px; top: 583.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.00876);"&gt;&lt;SPAN style="left: 153px; top: 655.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(0.949137);"&gt;1. enable&lt;/SPAN&gt;&lt;SPAN style="left: 153px; top: 679.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.04882);"&gt;&amp;gt; options high_security.enable on&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 186px; top: 583.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.00876);"&gt;&lt;SPAN style="left: 153px; top: 727.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.06474);"&gt;2. Follow the prompts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 186px; top: 583.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.00876);"&gt;&lt;SPAN style="left: 153px; top: 775.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.03654);"&gt;Review Documentation: &lt;/SPAN&gt;&lt;A href="https://library.netapp.com/ecmdocs/ECMP1155684/html/GUID-F18578C5-BD85-4162-B6A6-8F2BA67A5251.html" target="_self"&gt;&lt;SPAN style="left: 333px; top: 775.5px; font-size: 16px; font-family: sans-serif; transform: scaleX(1.02481);"&gt;Setting up and Starting SSH service&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 18:16:56 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156917#M10168</guid>
      <dc:creator>andris</dc:creator>
      <dc:date>2020-06-11T18:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerblilties on old FAS 6080</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156947#M10169</link>
      <description>&lt;P&gt;I have compared keys on both controllres and they look the same or similar at least.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They are 7-Mode HA pair yes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suspect it doesn't get the relevant key on vfiler0, how do I check that though? When I try work on vfiler0 I get the following:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;FAS6080&amp;gt; vfiler context vfiler0&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Use of vfilers requires multistore licensed_feature option enabled.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;You mention deleting the DH key, again, how do I do that? I see no option under secureadmin to do that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the other HA pair, neither controller wants to enable high security, both says it cannot be enabled. &lt;span class="lia-unicode-emoji" title=":neutral_face:"&gt;😐&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your assistance so far though!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 06:54:22 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156947#M10169</guid>
      <dc:creator>debstef</dc:creator>
      <dc:date>2020-06-12T06:54:22Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerblilties on old FAS 6080</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156951#M10170</link>
      <description>&lt;P&gt;Have you tried generating those keys as Andris suggested in the previous post ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just on the vfiler: vfiler0 actually is your main filer. The error you see just means, you don't have any vfilers running on your filer.&amp;nbsp; You are already on vfiler0 (which is your main filer). If you do 'vfiler status' it should show vfiler0 running if none others are configured, if there are other vfilers, then it will also show up.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 08:58:47 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156951#M10170</guid>
      <dc:creator>Ontapforrum</dc:creator>
      <dc:date>2020-06-12T08:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerblilties on old FAS 6080</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156953#M10171</link>
      <description>&lt;P&gt;Hmmm a classic example of monkey behind the keyboard... &lt;span class="lia-unicode-emoji" title=":neutral_face:"&gt;😐&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I never read Andris' post properly and focused on SSL. Followed the steps to setup SSH again and magic!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;options high_security.enable on set successfully on all 4 controllers&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for everyone's assistance here!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Stefan&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 10:07:54 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156953#M10171</guid>
      <dc:creator>debstef</dc:creator>
      <dc:date>2020-06-12T10:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerblilties on old FAS 6080</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156955#M10172</link>
      <description>&lt;P&gt;Glad to know that, you're welcome! Thanks Andris.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 10:36:23 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Security-Vulnerblilties-on-old-FAS-6080/m-p/156955#M10172</guid>
      <dc:creator>Ontapforrum</dc:creator>
      <dc:date>2020-06-12T10:36:23Z</dc:date>
    </item>
  </channel>
</rss>

