Nessus Scanner reporting Medium Vulnerability on SSL Certs
We have M370 firebox and have recently moved from SSLVPN to IKEv2. However, we have one home user who we just can't get working on IKEv2 and have thus needed to leave SSLVPN active for this one user.
Our parent organisation run weekly Nessus Scans and these report:
Medium Vulnerability Name : "SSL Self-Signed Certificate" and "SSL Certificate Cannot Be Trusted"
What steps do I need to take to prevent these vulnerabilities being picked up by the Nessus scan while we continue to provide SSLVPN access to this one user?