<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Medium strenght Ciphers in HPE OneView</title>
    <link>https://community.hpe.com/t5/hpe-oneview/medium-strength-ciphers/m-p/7155059#M6694</link>
    <description>You have a few options:&lt;BR /&gt;&lt;BR /&gt;1. Put the appliance into FIPS or CNSA cryptography mode. This will limit certain services you may be using thag might not support either mode. A compatibility report must be run first.&lt;BR /&gt;2. Update to OneView 6.40, which you can enforce GCM ciphers for the UI and API only. This has no impact of other protocols or ciphers that could be used for outbound communications.</description>
    <pubDate>Wed, 24 Nov 2021 18:07:40 GMT</pubDate>
    <dc:creator>ChrisLynch</dc:creator>
    <dc:date>2021-11-24T18:07:40Z</dc:date>
    <item>
      <title>Medium strength Ciphers</title>
      <link>https://community.hpe.com/t5/hpe-oneview/medium-strength-ciphers/m-p/7155039#M6692</link>
      <description>&lt;P&gt;Is there a way to tell OneView to not use medium strength (or lower) ciphers?&amp;nbsp; We are currently running version 6.10.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 11:01:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/medium-strength-ciphers/m-p/7155039#M6692</guid>
      <dc:creator>BradV</dc:creator>
      <dc:date>2021-11-29T11:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: Medium strenght Ciphers</title>
      <link>https://community.hpe.com/t5/hpe-oneview/medium-strength-ciphers/m-p/7155059#M6694</link>
      <description>You have a few options:&lt;BR /&gt;&lt;BR /&gt;1. Put the appliance into FIPS or CNSA cryptography mode. This will limit certain services you may be using thag might not support either mode. A compatibility report must be run first.&lt;BR /&gt;2. Update to OneView 6.40, which you can enforce GCM ciphers for the UI and API only. This has no impact of other protocols or ciphers that could be used for outbound communications.</description>
      <pubDate>Wed, 24 Nov 2021 18:07:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/medium-strength-ciphers/m-p/7155059#M6694</guid>
      <dc:creator>ChrisLynch</dc:creator>
      <dc:date>2021-11-24T18:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: Medium strenght Ciphers</title>
      <link>https://community.hpe.com/t5/hpe-oneview/medium-strength-ciphers/m-p/7155293#M6697</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;Thanks!&amp;nbsp; I will look into getting the update.&amp;nbsp; It is port 5671 they are complaining about.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 10:21:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/medium-strength-ciphers/m-p/7155293#M6697</guid>
      <dc:creator>BradV</dc:creator>
      <dc:date>2021-11-29T10:21:58Z</dc:date>
    </item>
  </channel>
</rss>

