{"id":880,"date":"2014-10-28T13:05:45","date_gmt":"2014-10-28T13:05:45","guid":{"rendered":"https:\/\/fir3netwp.gmsrrpobkbd.com\/2014\/10\/28\/mitigating-poodle-on-the-brocade-adx\/"},"modified":"2021-07-24T17:06:36","modified_gmt":"2021-07-24T17:06:36","slug":"mitigating-poodle-on-the-brocade-adx","status":"publish","type":"post","link":"https:\/\/www.fir3net.com\/Loadbalancers\/Brocade\/mitigating-poodle-on-the-brocade-adx.html","title":{"rendered":"Mitigating Poodle on the Brocade ADX"},"content":{"rendered":"

In order to mitigate the Poodle vulnerability on the Brocade ADX SSLv3 must be disabled. However this can only be achieved via the code release 12.4s, which disables SSLv3 completely. All code versions prior to this do not have any method or option to disable the SSLv3 protocol.<\/p>\n

HealthChecks<\/h2>\n

On the ADX there are 2 types of SSL healthcheck<\/a>. They are,<\/p>\n