<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Does Cisco have any updates in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697258#M54568</link>
    <description>&lt;P&gt;Does Cisco have any updates on this? Currently we are on ISE 1.2, patch 14. I am planning on upgrading to the latest patch level soon, but I would like to hold out in case a fix is around the corner. I saw another forum that said ISE 1.4 was not impacted. We plan on moving to that later this fall, but I would like to remedy this before that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/discussion/12550791/ise-guestportal-and-diffie-hellman-key-exchange&lt;/P&gt;</description>
    <pubDate>Tue, 04 Aug 2015 13:12:29 GMT</pubDate>
    <dc:creator>joshobean</dc:creator>
    <dc:date>2015-08-04T13:12:29Z</dc:date>
    <item>
      <title>Fixes planned for bug CSCuv21820?</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697256#M54566</link>
      <description>&lt;P&gt;Our Cisco ISE infrastructure is impacted by this bug. Any admin user trying to go to the company sponsor portal or a guest re-directed to the web auth page for guest authentication will now receive the weak key message detailed in the bug description.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are there any planned fixes? The two work-arounds suggested are not ideal for us. We are using internet explorer to get by for now, but this could negatively impact our guest wireless users who have Firefox.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:56:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697256#M54566</guid>
      <dc:creator>joshobean</dc:creator>
      <dc:date>2019-03-11T05:56:54Z</dc:date>
    </item>
    <item>
      <title>As of Chrome 45, Chrome will</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697257#M54567</link>
      <description>&lt;P&gt;As of Chrome 45, Chrome will now error out on this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;https://www.chromium.org/administrators/err_ssl_weak_server_ephemeral_dh_key&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need a fix, not a browser-side workaround.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2015 10:46:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697257#M54567</guid>
      <dc:creator>fields.james</dc:creator>
      <dc:date>2015-07-31T10:46:09Z</dc:date>
    </item>
    <item>
      <title>Does Cisco have any updates</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697258#M54568</link>
      <description>&lt;P&gt;Does Cisco have any updates on this? Currently we are on ISE 1.2, patch 14. I am planning on upgrading to the latest patch level soon, but I would like to hold out in case a fix is around the corner. I saw another forum that said ISE 1.4 was not impacted. We plan on moving to that later this fall, but I would like to remedy this before that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/discussion/12550791/ise-guestportal-and-diffie-hellman-key-exchange&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2015 13:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697258#M54568</guid>
      <dc:creator>joshobean</dc:creator>
      <dc:date>2015-08-04T13:12:29Z</dc:date>
    </item>
    <item>
      <title>We asked TAC about a fix for</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697259#M54569</link>
      <description>&lt;P&gt;We asked TAC about a fix for 1.2. They replied that it's not planned to provide a fix for this in version 1.2. TAC recommend the use of the browser based workaround or update ISE to 1.3 or 1.4. Sadly, that's not possible in a hotspot environment to provide the users a fix which weaks TLS/SSL configuration.&lt;/P&gt;&lt;P&gt;From our customer point of view, we cannot understand Cisco in this case - 1.2. isn't EOS, a patch for 1.2 should be self-evident.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2015 07:27:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697259#M54569</guid>
      <dc:creator>Matthias Tietze</dc:creator>
      <dc:date>2015-08-06T07:27:41Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply Matthias</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697260#M54570</link>
      <description>&lt;P&gt;Thanks for the reply Matthias. The response you received is unacceptable from my point of view. If this is a current supported version it should be patched, I would think the complaints from customers would be significant for some organizations, not to mention the possible security vulnerabilities from using a weaker DH key type for encryption.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would make a bigger deal of this but since we should be upgrading and moving to newer equipment soon I will probably just move on.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2015 12:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697260#M54570</guid>
      <dc:creator>joshobean</dc:creator>
      <dc:date>2015-08-06T12:56:07Z</dc:date>
    </item>
    <item>
      <title>I'm using 1.2.1.198 and was</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697261#M54573</link>
      <description>&lt;P&gt;I'm using 1.2.1.198 and was told this was to be fixed in the forthcoming patch level 7 and I'm awaiting a release date for that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The actual problem is just in the configuration of Tomcat, so it should be a real simple fix...&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2015 09:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697261#M54573</guid>
      <dc:creator>Petrus van de Sande</dc:creator>
      <dc:date>2015-08-21T09:30:50Z</dc:date>
    </item>
    <item>
      <title>Are they patching 1.2.0.899?</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697262#M54574</link>
      <description>&lt;P&gt;Are they patching 1.2.0.899?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2015 12:50:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697262#M54574</guid>
      <dc:creator>joshobean</dc:creator>
      <dc:date>2015-08-21T12:50:24Z</dc:date>
    </item>
    <item>
      <title>Dunno mate, I'd recommend you</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697263#M54575</link>
      <description>&lt;P&gt;Dunno mate, I'd recommend you ask Cisco...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Open a TAC case and inquire, you know the Bug ID so it should be fairly simple for them to look at the road maps and tell you.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2015 12:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697263#M54575</guid>
      <dc:creator>Petrus van de Sande</dc:creator>
      <dc:date>2015-08-21T12:57:28Z</dc:date>
    </item>
    <item>
      <title>For Chrome, use this shortcut</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697264#M54577</link>
      <description>&lt;P style="font-size: 14.399998664856px; line-height: normal;"&gt;For Chrome, use this shortcut:&amp;nbsp;&lt;/P&gt;
&lt;P style="font-size: 14.399998664856px; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE&gt;
&lt;CODE&gt;C:\Program Files (x86)\Google\Chrome\Application\chrome.exe&amp;amp;quot; --cipher-suite-blacklist=0x0088,0x0087,0x0039,0x0038,0x0044,0x0045,0x0066,0x0032,0x0033,0x0016,0x0013&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 Sep 2015 03:18:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697264#M54577</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2015-09-09T03:18:00Z</dc:date>
    </item>
    <item>
      <title>It is solved in version 1.2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697265#M54578</link>
      <description>&lt;PRE class="tw-data-text vk_txt tw-ta tw-text-small" data-fulltext="" data-placeholder="Traducción" dir="ltr" id="tw-target-text" style="unicode-bidi: -webkit-isolate; font-family: inherit; border: none; padding: 0px 0.14em 0px 0px; position: relative; margin-bottom: 0px; resize: none; overflow: hidden; width: 237.5px; color: rgb(33, 33, 33); height: 48px; font-size: 16px !important; line-height: 24px !important; background-color: rgb(255, 255, 255);"&gt;
&lt;SPAN lang="en"&gt;It is solved in version 1.2.1 Patch 7&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 Sep 2015 04:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697265#M54578</guid>
      <dc:creator>Javier Campos</dc:creator>
      <dc:date>2015-09-09T04:17:45Z</dc:date>
    </item>
    <item>
      <title>It looks like 1.2.1 Patch 7</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697266#M54580</link>
      <description>&lt;P&gt;It looks like 1.2.1 Patch 7 does fix this per release notes. (released 8/28/15)&lt;BR /&gt;I am also wanting to inquire about a fix for 1.2.1 ?? Anyone out there at Cisco listening here?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 14:16:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697266#M54580</guid>
      <dc:creator>bonomichael</dc:creator>
      <dc:date>2015-09-09T14:16:21Z</dc:date>
    </item>
    <item>
      <title>correct, the patch 7 is the</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697267#M54582</link>
      <description>&lt;PRE class="tw-data-text vk_txt tw-ta tw-text-small" data-fulltext="" data-placeholder="Traducción" dir="ltr" id="tw-target-text" style="unicode-bidi: -webkit-isolate; font-family: inherit; border: none; padding: 0px 0.14em 0px 0px; position: relative; margin-bottom: 0px; resize: none; overflow: hidden; width: 237.5px; color: rgb(33, 33, 33); height: 72px; font-size: 16px !important; line-height: 24px !important; background-color: rgb(255, 255, 255);"&gt;
&lt;SPAN lang="en"&gt;correct, the patch 7 is the solution to version 1.2.1 , I've implemented on 2 customers&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 Sep 2015 14:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697267#M54582</guid>
      <dc:creator>Javier Campos</dc:creator>
      <dc:date>2015-09-09T14:27:45Z</dc:date>
    </item>
    <item>
      <title>they should be fixing 1.2.0</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697268#M54584</link>
      <description>&lt;P&gt;they should be fixing 1.2.0 too. No reason something that is not EOL/EOS shouldn't have a patch&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 14:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697268#M54584</guid>
      <dc:creator>bonomichael</dc:creator>
      <dc:date>2015-09-09T14:58:46Z</dc:date>
    </item>
    <item>
      <title>Sadly this does not appear to</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697269#M54586</link>
      <description>&lt;P&gt;Sadly this does not appear to be the case. The issue is escalating in our environment, and we are likely going to be forced to upgrade ISE, which other than this bug is working perfectly and is very stable. I'm not happy to say the least.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I got this response from TAC this morning:&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;&lt;P&gt;Josh,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately the 1.2.0 code train is at the end of it’s software life cycle for new patches. However, the mostly recent (and also final) patch on 1.2.1, patch 7, includes the fix. Basically, to resolve the behavior an upgrade to 1.2.1 Patch 7 is the minimum requirement.&amp;nbsp;&lt;/P&gt;&lt;P&gt;*****&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 15:25:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697269#M54586</guid>
      <dc:creator>joshobean</dc:creator>
      <dc:date>2015-09-09T15:25:04Z</dc:date>
    </item>
    <item>
      <title>Not sure i understand how</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697270#M54587</link>
      <description>&lt;P&gt;Not sure i understand how this could be "&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;1.2.0 code train is at the end of it’s software life cycle for new patches.&amp;nbsp;&lt;/SPAN&gt;" given the fact that there has been no EOL announcement.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will be escalating this with my account team.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyway you can provide your TAC case # so that I can add ammo when reporting to my AM?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 15:34:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697270#M54587</guid>
      <dc:creator>bonomichael</dc:creator>
      <dc:date>2015-09-09T15:34:56Z</dc:date>
    </item>
    <item>
      <title>Happy to provide that info:</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697271#M54588</link>
      <description>&lt;P&gt;Happy to provide that info: SR 636260175.&lt;/P&gt;&lt;P&gt;Let me know if you get any traction with your account rep. I know a major code upgrade is coming for my environment eventually, but if a patch would get us through the end of this year on code 1.2.0&amp;nbsp; that would help tremendously.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 15:46:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697271#M54588</guid>
      <dc:creator>joshobean</dc:creator>
      <dc:date>2015-09-09T15:46:07Z</dc:date>
    </item>
    <item>
      <title>Hi there.Yes Cisco should</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697272#M54589</link>
      <description>&lt;P&gt;Hi there.&lt;/P&gt;&lt;P&gt;Yes Cisco should find a fix for their devices as soon as possible. I agree.&amp;nbsp;&lt;/P&gt;&lt;P&gt;BUT,&lt;/P&gt;&lt;P&gt;We should &amp;nbsp;complain to Google too. Their approach on forcing security is not quite true i beleive. They must consider to mask&amp;nbsp;the &lt;U&gt;Internal&lt;/U&gt; SSL certificated&amp;nbsp;web servers of some specific devices with private IP adresses. Corporate Captive portals, corporate guest portals and corporate&amp;nbsp;sponsor portals are not a thread to mobile phones.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco may not fix the problem on every type of devices quickly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 12:41:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697272#M54589</guid>
      <dc:creator>turklandbank</dc:creator>
      <dc:date>2015-09-18T12:41:49Z</dc:date>
    </item>
    <item>
      <title>worked through my account</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697273#M54590</link>
      <description>&lt;P&gt;worked through my account team. Cisco does not publish EOL for software. but ISE 1.2.0 is no longer updated. As easy as it would be to create a patch for 1.2.0&amp;nbsp;for this issue, they wont. 1.2.1 Patch 7 is minimum.&amp;nbsp;&lt;/P&gt;&lt;P&gt;in the mean time, direct users to IE or safari. they are currently unaffected as far as i know. having users (mostly guest in my case) disable ciphers in their browsers is just not going to happen.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 13:26:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697273#M54590</guid>
      <dc:creator>bonomichael</dc:creator>
      <dc:date>2015-09-18T13:26:44Z</dc:date>
    </item>
    <item>
      <title>Dittos...we applied 1.2.1.x</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697274#M54591</link>
      <description>&lt;P&gt;Dittos...we applied 1.2.1.x Patch 7 a few days ago, and it was quick and painless...services restarted but there was no full ISE reboot. &amp;nbsp;We went from tons of guest complaints daily to smooth sailing. &amp;nbsp;As always read all caveats and know your own environment to the extent possible, but seems that it's this patch, upgrade to 1.3, or have a ton of unsatisfied customers.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 13:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697274#M54591</guid>
      <dc:creator>Nickolus Looper</dc:creator>
      <dc:date>2015-09-18T13:39:20Z</dc:date>
    </item>
    <item>
      <title>Did you upgraded from 1.2 to</title>
      <link>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697275#M54592</link>
      <description>&lt;P&gt;Did you upgraded from 1.2 to 1.2.1 for this fix? Or just apply Patch 7 while already on 1.2.1 code? I have a distributed ISE deployment, and I didn't think going from any version to another was a simple matter with ISE, although I agree applying a patch is usually no sweat if it is to existing code.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 13:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixes-planned-for-bug-cscuv21820/m-p/2697275#M54592</guid>
      <dc:creator>joshobean</dc:creator>
      <dc:date>2015-09-18T13:44:49Z</dc:date>
    </item>
  </channel>
</rss>

