<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TLS1.0 on supplicant authenticating to ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818961#M484324</link>
    <description>&lt;P&gt;Thank you Arne!&lt;/P&gt;
&lt;P&gt;This was suggested by Nadav as well.&amp;nbsp; It did fix my initial issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 13 Mar 2019 16:55:51 GMT</pubDate>
    <dc:creator>rsharp001</dc:creator>
    <dc:date>2019-03-13T16:55:51Z</dc:date>
    <item>
      <title>TLS1.0 on supplicant authenticating to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818412#M484312</link>
      <description>&lt;P&gt;I have a new setup of ISE and I am currently testing the ability to connect various devices.&amp;nbsp; I have noticed my Windows 10 supplicants ar being rejected by ISE with the following error: "Client requested TLSv1.0 or TLSv1.1 that is not allowed"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I cannot find anything on the supplicants to force a higher version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did find in ISE where I can allow it to accept TLS1.0.&amp;nbsp; When I enable this the authentications work as I expect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Am I missing a setting in ISE or on the supplicant?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 21:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818412#M484312</guid>
      <dc:creator>rsharp001</dc:creator>
      <dc:date>2019-03-12T21:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on supplicant authenticating to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818418#M484313</link>
      <description>&lt;P&gt;Same thing with some other supplicants like a Cisco 3700 series AP doing EAP-FAST - it expects to use TLS 1.0 and SHA1 - if you don't enable those in ISE (i.e. make ISE backwards compatible with protocols that should be outlawed) then your AP won't authenticate via EAP-FAST.&amp;nbsp; Sad state of affairs.&lt;/P&gt;
&lt;P&gt;As for Windows 10 native supplicant I am surprised that this is the case.&amp;nbsp; I have not tested in a while but I am pretty sure Windows uses TLS 1.2 - but I stand to be corrected.&amp;nbsp; TLS 1.2 has been around for a long time now and is already starting to look dated.&amp;nbsp; Maybe there is a registry setting in Windows that is not set right (or never got upgraded if the OS was upgraded from XP/Win7 etc.) - no idea.&amp;nbsp; Keep us updated with your findings.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 21:35:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818418#M484313</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-03-12T21:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on supplicant authenticating to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818431#M484317</link>
      <description>&lt;P&gt;Fresh Win10 machine, only thing I could guess may be tipping the scale is it was joined to our domain.&amp;nbsp; Maybe we have a carryover in a GPO?&amp;nbsp; I've been working with our server/systems guy but he isn't totally sure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried with the native supplicant and with the net manager piece of AnyConnect, all are giving the same issue.&amp;nbsp; Looks like I may be biting the bullet and turning on the support for TLS1.0, seems odd that such newer devices are forcing that first.&amp;nbsp; Would you suggest using something other than EAP-FAST?&amp;nbsp; I have flipped my setting sin AnyConnect to use TTLS but did not gain any more traction there.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 21:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818431#M484317</guid>
      <dc:creator>rsharp001</dc:creator>
      <dc:date>2019-03-12T21:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on supplicant authenticating to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818619#M484320</link>
      <description>&lt;P&gt;All Windows workstations as of Windows 7 support changing the SSL/TLS versions with which they authenticate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Take a look at:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.microsoft.com/en-us/help/3121002/windows-10-devices-can-t-connect-to-an-802-1x-environment" target="_self"&gt;https://support.microsoft.com/en-us/help/3121002/windows-10-devices-can-t-connect-to-an-802-1x-environment&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are interested in only authenticating EAP-TLS with TLS 1.2, change the key to&amp;nbsp;&lt;SPAN&gt;0xC00. If you'd like to support either 1.1 or 1.2, but nothing else, you can logical OR the key to 0xC00 | 0x300 == 0xF00. Same goes for any combination.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once this is done, either reset the workstations or restart the net3svc and eaphost services.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is for the Windows native EAP supplicant. If I recall, the AnyConnect negotiated cipher suites and TLS versions are a subset of the Windows native supplicant, though I'm not 100% about that. You should update the Windows supplicant and see if that helps.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 08:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818619#M484320</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2019-03-13T08:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on supplicant authenticating to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818625#M484321</link>
      <description>Hi Arne,&lt;BR /&gt;We faced same issue on our new win10 machines, the VPN certificate base authentication stopped working.&lt;BR /&gt;After troubleshooting it appears than win10 machines comes with default TLS v1.1 as maximum and the ASA was configured TLS v1.2 minimum.&lt;BR /&gt;I had to reduce the minimum version to TLS1.1 on the FW to make it work again.&lt;BR /&gt;Weird why Microsoft does not enable TLS1.2 by default on their Win 10 machines.</description>
      <pubDate>Wed, 13 Mar 2019 08:39:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818625#M484321</guid>
      <dc:creator>bern81</dc:creator>
      <dc:date>2019-03-13T08:39:38Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on supplicant authenticating to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818636#M484322</link>
      <description>&lt;P&gt;hhhm.&amp;nbsp; Since November 2018 windows Windows 10 started using TLS 1.2 - I had no idea.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are registry hacks to change this to whatever version you need- see article below&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.microsoft.com/en-au/help/3121002/windows-10-devices-can-t-connect-to-an-802-1x-environment" target="_blank"&gt;https://support.microsoft.com/en-au/help/3121002/windows-10-devices-can-t-connect-to-an-802-1x-environment&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 08:57:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818636#M484322</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-03-13T08:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on supplicant authenticating to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818958#M484323</link>
      <description>&lt;P&gt;Thank you Nadav!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This article got me over the hump.&amp;nbsp; I'm going to test on some more machines before making any system wide changes but now I'm getting past that hurdle without enabling TLS1.0 on ISE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 16:53:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818958#M484323</guid>
      <dc:creator>rsharp001</dc:creator>
      <dc:date>2019-03-13T16:53:10Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.0 on supplicant authenticating to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818961#M484324</link>
      <description>&lt;P&gt;Thank you Arne!&lt;/P&gt;
&lt;P&gt;This was suggested by Nadav as well.&amp;nbsp; It did fix my initial issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 16:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls1-0-on-supplicant-authenticating-to-ise/m-p/3818961#M484324</guid>
      <dc:creator>rsharp001</dc:creator>
      <dc:date>2019-03-13T16:55:51Z</dc:date>
    </item>
  </channel>
</rss>

