<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 3.0 Patch 4 - PxGrid Broken in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-3-0-patch-4-pxgrid-broken/m-p/4521313#M571818</link>
    <description>&lt;P&gt;Yes, we have seen some customer deployments with lots of stale certificates in the database. Please ask TAC to clean them up or escalate to our BE teams as needed.&lt;/P&gt;</description>
    <pubDate>Mon, 20 Dec 2021 01:49:11 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2021-12-20T01:49:11Z</dc:date>
    <item>
      <title>ISE 3.0 Patch 4 - PxGrid Broken</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-0-patch-4-pxgrid-broken/m-p/4519590#M571711</link>
      <description>&lt;P&gt;Anyone else having issues with pxGrid not working on ISE 3.0 Patch 4 in a distributed deployment? All of my integrations between ISE and our WSA, FMC and Stealthwatch are broken.&amp;nbsp; Even running the Health Monitor Test for pxGrid fails with the log output below. I have a TAC case open but just wondering if anyone else has pxGrid issues with 3.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV&gt;15-Dec-2021 20:40:04 [INFO] ************** pxGrid Session Directory Test ***************&lt;BR /&gt;15-Dec-2021 20:40:04 [INFO] ----------------- Starting Connection Test -----------------&lt;BR /&gt;15-Dec-2021 20:40:04 [INFO] pxGrid Node: [PAN &lt;EM&gt;Node Name Removed&lt;/EM&gt;]&lt;BR /&gt;15-Dec-2021 20:40:04 [ERROR] Test set up failed due to internal error. Exception: {}&lt;BR /&gt;javax.net.ssl.SSLProtocolException: The size of the handshake message (34086) exceeds the maximum allowed size (32768)&lt;BR /&gt;at sun.security.ssl.SSLSocketInputRecord.decodeInputRecord(SSLSocketInputRecord.java:309)&lt;BR /&gt;at sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:190)&lt;BR /&gt;at sun.security.ssl.SSLTransport.decode(SSLTransport.java:109)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1383)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1291)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:435)&lt;BR /&gt;at sun.net.&lt;A href="http://www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559" target="_blank" rel="noopener"&gt;www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559&lt;/A&gt;)&lt;BR /&gt;at sun.net.&lt;A href="http://www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:197" target="_blank" rel="noopener"&gt;www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:197&lt;/A&gt;)&lt;BR /&gt;at sun.net.&lt;A href="http://www.protocol.http.HttpURLConnection.getOutputStream0(HttpURLConnection.java:1340" target="_blank" rel="noopener"&gt;www.protocol.http.HttpURLConnection.getOutputStream0(HttpURLConnection.java:1340&lt;/A&gt;)&lt;BR /&gt;at sun.net.&lt;A href="http://www.protocol.http.HttpURLConnection.getOutputStream(HttpURLConnection.java:1315" target="_blank" rel="noopener"&gt;www.protocol.http.HttpURLConnection.getOutputStream(HttpURLConnection.java:1315&lt;/A&gt;)&lt;BR /&gt;at sun.net.&lt;A href="http://www.protocol.https.HttpsURLConnectionImpl.getOutputStream(HttpsURLConnectionImpl.java:264" target="_blank" rel="noopener"&gt;www.protocol.https.HttpsURLConnectionImpl.getOutputStream(HttpsURLConnectionImpl.java:264&lt;/A&gt;)&lt;BR /&gt;at com.cisco.cpm.pxgrid.connection.TestSessionDirectoryHelper.sendRequest(TestSessionDirectoryHelper.java:114)&lt;BR /&gt;at com.cisco.cpm.pxgrid.connection.TestSessionDirectoryHelper.serviceLookup(TestSessionDirectoryHelper.java:62)&lt;BR /&gt;at com.cisco.cpm.pxgrid.connection.TestSessionDirectory.testConnection(TestSessionDirectory.java:153)&lt;BR /&gt;at com.cisco.cpm.pxgrid.connection.TestSessionDirectory.runTest(TestSessionDirectory.java:118)&lt;BR /&gt;at com.cisco.cpm.pxgrid.connection.TestSessionDirectory.main(TestSessionDirectory.java:95)&lt;BR /&gt;15-Dec-2021 20:40:04 [INFO] ------------------ Connection Test FAILED ------------------&lt;BR /&gt;15-Dec-2021 20:40:04 [INFO] ********** pxGrid Session Directory Test Complete **********&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 22:04:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-0-patch-4-pxgrid-broken/m-p/4519590#M571711</guid>
      <dc:creator>Louis Gonzales</dc:creator>
      <dc:date>2021-12-15T22:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.0 Patch 4 - PxGrid Broken</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-0-patch-4-pxgrid-broken/m-p/4521313#M571818</link>
      <description>&lt;P&gt;Yes, we have seen some customer deployments with lots of stale certificates in the database. Please ask TAC to clean them up or escalate to our BE teams as needed.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 01:49:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-0-patch-4-pxgrid-broken/m-p/4521313#M571818</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2021-12-20T01:49:11Z</dc:date>
    </item>
  </channel>
</rss>

