openssl s_client -connect <website.com>:443
4. Locate the following output which will list the Cipher being used:
SSL handshake has read 3393 bytes and written 415 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: 1DD3FFEC8292344B9C2E81C0DD00E09369AA855AA2DF6A0A254199F0B3A572F5
Session-ID-ctx:
Master-Key: 86F8F905004EE31194278B82854DD098DD33FCB46F050773FC0B7F892EC0E44D98D27E49A2E19DA7D87C22A5549B3E73
Key-Arg : None
Krb5 Principal: None
PSK identity: None
PSK identity hint: None
Start Time: 1522251405
Timeout : 300 (sec)
Verify return code: 0 (ok)
5. Check with Oracle documentation to see if Java7 (which is embedded with SystemEDGE 5.9 SRM AIM) Supports the cipher:
Java7
https://docs.oracle.com/javase/7/docs/technotes/guides/security/SunProviders.html
Java8
https://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html
6. If you determine you need to update to Java8 download the private instance from Oracle:
http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html
7. The steps to update the SystemEDGE SRM AIM Embedded Java is as follows:
Troubleshooting SRM AIM HTTP/HTTPS Connection Problems
https://knowledge.broadcom.com/external/article?articleId=36979
CA SystemEDGE SRM AIM not Monitoring HTTPS sites with TLS Authentication
https://knowledge.broadcom.com/external/article?articleId=31294