Minimum Encryption Strength.
You should set the minimim encryption strength that your server accepts to at least 128-bit, or preferably higher.
For example on a venerable old Tomcat 4 server you can edit the following ciphers entry in the server.xml file:
<!-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 -->
<Connector acceptCount="100"
className="org.apache.coyote.tomcat4.CoyoteConnector"
debug="0"
disableUploadTimeout="true"
enableLookups="false"
maxProcessors="150"
minProcessors="5"
port="8443"
scheme="https"
secure="true"
useURIValidationHack="false"
ciphers="SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA">
<Factory className="org.apache.coyote.tomcat4.CoyoteServerSocketFactory" clientAuth="false" keystoreFile="E:/dexterra/ConcertServer/platform-dist/server/conf/security/jdex.jks" keystorePass="password" protocol="TLS"/>
</Connector>