Skip to content
DataMiner DoJo

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Search in posts
Search in pages
Log in
Menu
  • Updates & Insights
  • Questions
  • Learning
    • E-learning Courses
    • Empower Replay: Limited Edition
    • Tutorials
    • Open Classroom Training
    • Certification
      • DataMiner Fundamentals
      • DataMiner Configurator
      • DataMiner Automation
      • Scripts & Connectors Developer: HTTP Basics
      • Scripts & Connectors Developer: SNMP Basics
      • Visual Overview – Level 1
      • Verify a certificate
    • Video Library
    • Books We Like
    • >> Go to DataMiner Docs
  • Expert Center
    • Solutions & Use Cases
      • Solutions
      • Use Case Library
    • Markets & Industries
      • Media production
      • Government & defense
      • Content distribution
      • Service providers
      • Partners
      • OSS/BSS
    • Agile
      • Agile Webspace
      • Everything Agile
        • The Agile Manifesto
        • Best Practices
        • Retro Recipes
      • Methodologies
        • The Scrum Framework
        • Kanban
        • Extreme Programming
      • Roles
        • The Product Owner
        • The Agile Coach
        • The Quality & UX Coach (QX)
    • DataMiner DevOps Professional Program
      • About the DevOps Program
      • DataMiner DevOps Support
  • Downloads
  • More
    • DataMiner Releases & Updates
    • Feature Suggestions
    • Climb the leaderboard!
    • Swag Shop
    • Contact
    • Global Feedback Survey
  • PARTNERS
    • All Partners
    • Technology Partners
    • Strategic Partner Program
    • Deal Registration
  • >> Go to dataminer.services

Cisco Nexus protocol – Handshake SSLv3 instead of TSL

Solved1.04K views16th May 2023CISCO Nexus security ssl TSL
4
André Kaiser [DevOps Advocate]532 13th May 2023 1 Comment

Hello Dojo Community,

we have a cluster of 5 DMAs that host a couple of Cisco Nexus elements. The Cisco Nexus protocol uses SNMP and NX API to poll data from Cisco Nexus Ethernet switches. On most agents this is working fine and both communication paths are running fine. One one recently added agent we see in a communication capture, that the handshake for the secure communication of the NX API communication is executed using SSLv3 instead of TSL1.2 like on all other agents. This causes the handshake to fail.

When we execute the same API commands outside of DataMiner from the server OS we see, that TSL 1.2 is used.

I understand, that DataMiner normally uses the default Windows settings for chosing the Transport Layer Security method.

Could there be a misconfiguration in DataMiner, that overrides this?

André Kaiser [DevOps Advocate] Selected answer as best 16th May 2023
André Kaiser [DevOps Advocate] commented 14th May 2023

Update: After setting the default protocol the communication is now using TSL1.0, but still not working correct. Seems at least TSL1.1, better TSL1.2 is expected.
https://community.dataminer.services/question/which-version-of-winhttp-and-ssl-tls-is-used-by-default/

Again we tested it outside of DataMiner and there still TSL1.2 is used for API communication.

1 Answer

  • Active
  • Voted
  • Newest
  • Oldest
3
Jeroen Neyt [SLC] [DevOps Advocate]2.35K Posted 15th May 2023 1 Comment

I've noticed that the Cisco Nexus connector consumes the NX API through a QAction by use of .NET Framework's HttpClient instead of a dedicated HTTP interface in the connector.

A dedicated HTTP interface is built directly on the native WinHTTP API and will use the registry settings that you've already put in place. HttpClient is actually another layer on top of that and might need some additional settings when targeting .NET Framework 4.6 (and earlier) which is the case for QActions.

In order to make it select the strongest available protocol by default, you'll need to add the SchUseStrongCrypto registry key and set its value to 0x00000001.

HKLM\SOFTWARE\Microsoft\.NETFramework\v4.0.30319\SchUseStrongCrypto: 0x00000001

And on 64-bit versions of Windows, it needs to be stored in the following location as well.

HKLM\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319\SchUseStrongCrypto: 0x00000001

As a reference, this procedure is documented in Configure for strong cryptography.

André Kaiser [DevOps Advocate] Posted new comment 16th May 2023
André Kaiser [DevOps Advocate] commented 16th May 2023

Many thanks. I changed these settings in the registry.

I compared them with the registry settings on the other DMAs, that are hosting elements with functional NX API connection. There these values were not present at all, same as the DMA with the issue.

So I also checked the installed .NET versions. There were less versions installed on the DMA with the issue. (.NET 6.13 and .NET 5.0.17 (x86). So I installed the same version for x86 and x64 on the agent and restarted the server. After that change the elements could communicate via NX API.

Issue resolved, many thanks for your help!

You are viewing 1 out of 1 answers, click here to view all answers.
Please login to be able to comment or post an answer.

My DevOps rank

DevOps Members get more insights on their profile page.

My user earnings

0 Dojo credits

Spend your credits in our swag shop.

0 Reputation points

Boost your reputation, climb the leaderboard.

Promo banner DataMiner DevOps Professiona Program
DataMiner Integration Studio (DIS)
Empower Katas
Privacy Policy • Terms & Conditions • Contact

© 2025 Skyline Communications. All rights reserved.

DOJO Q&A widget

Can't find what you need?

? Explore the Q&A DataMiner Docs

[ Placeholder content for popup link ] WordPress Download Manager - Best Download Management Plugin