/cfg/sys/access/https/tlsver
Allowed TLS Version Menu
This feature allows the user to set the allowed TLS versions for management connection.
Note: A "High" encryption cipher suite it used at the management connection. The ciphers cannot be adjusted.
 
[Allowed TLS Version Menu]
tls10 - Enable/disable TLS1.0 protocol version
tls11 - Enable/disable TLS1.1 protocol version
tls12 - Enable/disable TLS1.2 protocol version

tls13 - Enable/disable TLS1.3 protocol version
cur - Display current TLS protocol version
 
Intermediate CA Certificate Menu Options (/cfg/sys/access/https/tlsver) 
Command Syntax and Usage
tls10
 
Select to allow the TLS 1.0 protocol version for management connection.
Default: Disable
Note: TLS 1.0 is a non-secure protocol. Radware recommends using TLS1.2 or TLS1.3. instead.
tls11
 
Select to allow the TLS 1.1 protocol version for management connection.
Default: Disable
Note: TLS 1.1 is a non-secure protocol. Radware recommends using TLS1.2 or TLS1.3. instead.
tls12
 
Select to allow the TLS 1.2 protocol version for management connection.
Default = Enable
tls13
 
Select to allow the TLS 1.3 protocol version for management connection.
Default = Enable
cur
 
Displays the current TLS protocol version.