Skip to content

Commit 01aacc7

Browse files
Add note on VPN and use partial in troubleshooting.mdx
1 parent 531bd3b commit 01aacc7

File tree

2 files changed

+6
-5
lines changed

2 files changed

+6
-5
lines changed

src/content/docs/ssl/edge-certificates/additional-options/cipher-suites/troubleshooting.mdx

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,7 @@ Minimum TLS Version can cause issues if you are not supporting TLS 1.2 ciphers o
2020

2121
### Testing Minimum TLS version with curl
2222

23-
You can use the [--tls-max curl setting](https://curl.se/docs/manpage.html#--tls-max) to force a request to use `TLS 1.0`:
24-
`curl -svo /dev/null https://<hostname> --insecure --tlsv1.0 --tls-max 1.0`
25-
26-
Please note that local VPN or device security client on your device may prevent unsecure connection using legacy protocol like `TLS 1.0`: you'll need to make sure to disable such network or security client before running the test on your device.
23+
<Render file="test-tls-version" product="ssl" />
2724

2825
## Compatibility with certificate encryption
2926

src/content/partials/ssl/test-tls-version.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,8 @@ curl https://www.example.com -svo /dev/null --tls-max 1.1
1313

1414
If the TLS version you are testing is blocked by Cloudflare, the TLS handshake is not completed and returns an error:
1515

16-
`* error:1400442E:SSL routines:CONNECT_CR_SRVR_HELLO:tlsv1 alert`
16+
`* error:1400442E:SSL routines:CONNECT_CR_SRVR_HELLO:tlsv1 alert`
17+
18+
:::note
19+
Local VPN or a device security client may prevent insecure connections using legacy protocols like TLS 1.0. Make sure to disable such network or security client before running the test on your device.
20+
:::

0 commit comments

Comments
 (0)