<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE-PIC: How to Disable TLS 1.0 (and possibly TLS 1.1)? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4305679#M566062</link>
    <description>&lt;P&gt;Marcelo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for the reply! I did come across this at some point but didn't and still don't want to believe that such a premier organization as Cisco and a foundational platform that has a core function of supporting security, such as ISE (although it is the PIC branch, I believe it to run on the same platform because it notifies me that simply upgrading with a new license will unlock the full ISE features), lacks the means to disable a 20+ year old security protocol that has been depreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm sure the proper response from me would be to open a TAC case and let that process play out, but Cisco TAC is not what it once was. I just recently had a TAC case close that had been open roughly a year, with most of my cases being 3 - 6 months old prior to closing ( and sometimes not resolved). I understand it's partially related to the relatively young age of the Firepower platform and new bugs, I accepted that concept when adopting the platform.&amp;nbsp; But what does that say when someone wants to avoid using a support asset they pay a bill for...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyways, I am hoping someone knows of an non-documented method of turning off TLS 1.0/1.1 for the processes I listed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brandon&lt;/P&gt;</description>
    <pubDate>Thu, 11 Mar 2021 14:43:45 GMT</pubDate>
    <dc:creator>Brandon1</dc:creator>
    <dc:date>2021-03-11T14:43:45Z</dc:date>
    <item>
      <title>Cisco ISE-PIC: How to Disable TLS 1.0 (and possibly TLS 1.1)?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4305157#M566025</link>
      <description>&lt;P&gt;I have recently introduced Cisco ISE-PIC 2.7 into my infrastructure for the sole purpose of providing user identity management for Firepower access control. This is because the Firepower User Agent is no longer supported and ISE-PIC is now a requirement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My vulnerability management solutions (Nessus/Tenable) is scanning the ISE-PIC host and reporting the use of TLS 1.0. I need to figure out how to disable this and ideally only allow TLS 1.2 for any possible connection.&amp;nbsp; I have been thoroughly through the web GUI and CLI and have found no means to resolve this. My "Google" skills have also failed me. The six open TCP ports that accept TLS 1.0 connections all appear to be Java related.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone have any knowledge on how to accomplish this task?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am providing the six open ports accepting TLS 1.0 and the process information for each as retrieved from the ISE-PIC CLI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nessus reports TCP 9095&lt;/P&gt;&lt;P&gt;Process : java (1805)&lt;BR /&gt;tcp: :::9095, :::8095&lt;/P&gt;&lt;P&gt;iseadmi+ 1805 ? 1 Mon Jan 18 15:02:44 2021 /opt/CSCOcpm/jre/bin/java - 05:49:42&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Nessus reports TCP 8443&lt;BR /&gt;Nessus reports TCP 8444&lt;BR /&gt;Nessus reports TCP 8445&lt;BR /&gt;Nessus reports TCP 8910&lt;/P&gt;&lt;P&gt;Process : jsvc.exec (26698)&lt;BR /&gt;tcp: 127.0.0.1:8888, :::9061, :::9063, :::8905, :::8009, :::5514, :::9002, :::1099, :::2030, :::8910, :::8911, :::80, :::2035, :::9080, 10.0.0.60:8443, :::443, 10.0.0.60:8444, 10.0.0.60:8445, :::9085, :::29249, :::9090, 127.0.0.1:2020, :::9060&lt;BR /&gt;udp: 0.0.0.2:56564, 10.0.0.60:15648, 169.254.2.1:25735, 169.254.0.228:17931, 0.0.0.0:28750, 169.254.2.1:28972, 0.0.0.0:53916, 10.0.0.60:62150, 169.254.0.228:54512, :::33453, :::10335, :::44664, :::29927&lt;BR /&gt;&lt;BR /&gt;iseadmi+ 26698 ? 26697 Mon Jan 18 15:00:50 2021 jsvc.exec -java-home /opt/C 1-04:59:43&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nessus reports TCP 9094&lt;/P&gt;&lt;P&gt;Process : java (968)&lt;BR /&gt;tcp: :::9094, :::8092&lt;/P&gt;&lt;P&gt;iseadmi+ 968 ? 1 Mon Jan 18 15:02:39 2021 /opt/CSCOcpm/jre/bin/java - 05:32:15&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 19:31:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4305157#M566025</guid>
      <dc:creator>Brandon1</dc:creator>
      <dc:date>2021-03-10T19:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE-PIC: How to Disable TLS 1.0 (and possibly TLS 1.1)?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4305347#M566035</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/469747"&gt;@Brandon1&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;please take a look at:&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv02086/" target="_blank" rel="noopener"&gt;CSCvv02086 Add ability to disable TLS 1.0 and 1.1 on ISE PIC node&lt;/A&gt;.&lt;/P&gt;&lt;PRE&gt;Last Modified: Feb 9,2021&lt;BR /&gt;Status: Open&lt;BR /&gt;Severity: 6 Enhancement&lt;BR /&gt;Known Affected Releases: 2.4(0.357), 2.6(0.156), 2.7(0.356)&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Mar 2021 02:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4305347#M566035</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-03-11T02:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE-PIC: How to Disable TLS 1.0 (and possibly TLS 1.1)?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4305679#M566062</link>
      <description>&lt;P&gt;Marcelo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for the reply! I did come across this at some point but didn't and still don't want to believe that such a premier organization as Cisco and a foundational platform that has a core function of supporting security, such as ISE (although it is the PIC branch, I believe it to run on the same platform because it notifies me that simply upgrading with a new license will unlock the full ISE features), lacks the means to disable a 20+ year old security protocol that has been depreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm sure the proper response from me would be to open a TAC case and let that process play out, but Cisco TAC is not what it once was. I just recently had a TAC case close that had been open roughly a year, with most of my cases being 3 - 6 months old prior to closing ( and sometimes not resolved). I understand it's partially related to the relatively young age of the Firepower platform and new bugs, I accepted that concept when adopting the platform.&amp;nbsp; But what does that say when someone wants to avoid using a support asset they pay a bill for...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyways, I am hoping someone knows of an non-documented method of turning off TLS 1.0/1.1 for the processes I listed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brandon&lt;/P&gt;</description>
      <pubDate>Thu, 11 Mar 2021 14:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4305679#M566062</guid>
      <dc:creator>Brandon1</dc:creator>
      <dc:date>2021-03-11T14:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE-PIC: How to Disable TLS 1.0 (and possibly TLS 1.1)?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4306841#M566106</link>
      <description>&lt;P&gt;Regular ISE offers the ability to disable TLS 1.0 if you decide that is your best path forward.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/106350iC93559AF3B64EA3F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 20:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4306841#M566106</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-03-13T20:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE-PIC: How to Disable TLS 1.0 (and possibly TLS 1.1)?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4386405#M566722</link>
      <description>&lt;P&gt;Thomas,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your response. However, I would prefer not to purchase the full ISE platform for the sole purpose of fixing a security weakness in an already purchased (required to use for user based access control after Firepower User Agent was discontinued) product that has a core function of assisting with security.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure how your response and the previous from Marcelo got selected as the solution to my question, but I went ahead and fixed that. For note, the only solution to my question would involve the ability to disable TLS 1.0 (and TLS 1.1) in ISE-PIC 2.7+.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have a great day!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brandon&lt;/P&gt;</description>
      <pubDate>Tue, 13 Apr 2021 19:21:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/m-p/4386405#M566722</guid>
      <dc:creator>Brandon1</dc:creator>
      <dc:date>2021-04-13T19:21:31Z</dc:date>
    </item>
  </channel>
</rss>

