-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to disable SSLv3, TLS1.0 and TLS1.1 for a service group and vserver #229
Comments
@lumarel , can you please help us in understanding what exactly you are trying to achieve and what you are not able to achieve with relevant CLI and ansible playbook examples? |
@sumanth-lingappa Thank you for the reply! So it's basically this here: - name: Server config
citrix.adc.citrix_adc_server:
nitro_user: "{{ netscaler_user }}"
nitro_pass: "{{ netscaler_pass }}"
nsip: "{{ netscaler_fqdn }}"
name: "{{ item.name }}"
ipaddress: "{{ item.ip }}"
with_items:
- name: server01.example.com
ip: 10.0.0.1
- name: Servicegroup config SSL
citrix.adc.citrix_adc_servicegroup:
nitro_user: "{{ netscaler_user }}"
nitro_pass: "{{ netscaler_pass }}"
nsip: "{{ netscaler_fqdn }}"
servicegroupname: SG_example.com
servicetype: SSL
cip: enabled
cipheader: X-Forwarded-For
cka: false
clttimeout: 180
cmp: true
maxclient: 0
maxreq: 0
svrtimeout: 360
tcpb: false
tcpprofilename: nstcp_default_tcp_lan
useproxyport: true
usip: false
servicemembers:
mode: exact
attributes:
- servername: server01.example.com
port: 443
monitor_bindings:
mode: exact
attributes:
- mon_1
- name: Disable SSL and TLS for Servicegroup
citrix.adc.citrix_adc_nitro_request:
nitro_user: "{{ netscaler_user }}"
nitro_pass: "{{ netscaler_pass }}"
nsip: "{{ netscaler_fqdn }}"
operation: update
resource: sslservicegroup
name: SG_example.com
attributes:
servicegroupname: SG_example.com
ssl3: "DISABLED"
tls1: "DISABLED"
tls11: "DISABLED"
- name: vServer config SSL
citrix.adc.citrix_adc_cs_vserver:
nitro_user: "{{ netscaler_user }}"
nitro_pass: "{{ netscaler_pass }}"
nsip: "{{ netscaler_fqdn }}"
name: example.com
servicetype: SSL
ipv46: 10.1.0.1
port: 443
clttimeout: 180
servicegroupbindings:
- servicegroupname: SG_example.com
ssl_certkey: Cert_example.com
- name: Update eccCurve for vServer
citrix.adc.citrix_adc_nitro_request:
nitro_user: "{{ netscaler_user }}"
nitro_pass: "{{ netscaler_pass }}"
nsip: "{{ netscaler_fqdn }}"
operation: add
resource: sslvserver_ecccurve_binding
name: example.com
attributes:
vservername: example.com
ecccurvename: "{{ item }}"
with_items:
- P_384
- P_521 As you can see we want to create a vserver (in this case now a content switching vserver, as this was the first example that came across my way, but also needed for the lb vserver), which has only enabled the more modern SSL protocols and only has enabled specific ciphers. It could be that I overlooked this somewhere, so if also a link to the docs or the code would be great 🙂 Thanks! |
I know it's a very late reply :-) Hello @lumarel, Please let me know if you need further assistance. |
closing this for now. Please re-open/create a new issue if you need any help |
@sumanth-lingappa Sorry for the late reply as well, But yeah easily said, the new |
Similar to #64 I'm searching for a way to disable noted protocols for a service group,
has the implementation already been updated or am I just search for the wrong modules?
Best would be if it would be possible to define the list similar to
servicemembers
ormonitor_bindings
incitrix_adc_servicegroup
,citrix_adc_cs_vserver
andcitrix_adc_lb_vserver
.The same would also be nice to have for the
eccCurve
👌🏻Thank you for the already quite useful modules!
Cheers, Lukas
The text was updated successfully, but these errors were encountered: