<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict TLS version in RADIUS Policy in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/restrict-tls-version-in-radius-policy/m-p/4749300#M579068</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/485442"&gt;@Walker&lt;/a&gt;&amp;nbsp;, unfortunately as per the current versions of ISE&amp;nbsp; , such feature is not possible . If you go to the&amp;nbsp; menu displayed below (Administration&amp;gt;system&amp;gt;settings&amp;gt;security settings)&amp;nbsp; and enable/disable TLS versions, this is a configuration global that is implemented in all the nodes within your deployment and there is no way to restrict what you suggest by rules . What it will be ideal is that you update that device you mention using TLS 1.0 towards one of the newest versions .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RodrigoDiaz_0-1672865229393.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/172528iCFADCE7FDAD9798B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="RodrigoDiaz_0-1672865229393.png" alt="RodrigoDiaz_0-1672865229393.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Let me know if that helped you .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jan 2023 20:48:21 GMT</pubDate>
    <dc:creator>Rodrigo Diaz</dc:creator>
    <dc:date>2023-01-04T20:48:21Z</dc:date>
    <item>
      <title>Restrict TLS version in RADIUS Policy</title>
      <link>https://community.cisco.com/t5/network-access-control/restrict-tls-version-in-radius-policy/m-p/4749199#M579067</link>
      <description>&lt;P&gt;I am in the process of migrating from v2.4 to v3.1 and during this process, a new device type was introduced to our network that only supports TLSv1.0. On the new v3.1 ISE server, I have disabled TLSv1.0 and TLSv1.1 in the security settings. The devices are currently working on our v2.4 server because all TLS version are enabled.&lt;/P&gt;&lt;P&gt;My question - If I enable TLSv1.0 on my v3.1 ISE server, is there a way to restrict authentication to all devices to TLSv1.2 except if it is this specific device? I am browsing the RADIUS attributes but unable to find anything relevant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions is appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2023 16:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restrict-tls-version-in-radius-policy/m-p/4749199#M579067</guid>
      <dc:creator>Walker</dc:creator>
      <dc:date>2023-01-04T16:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict TLS version in RADIUS Policy</title>
      <link>https://community.cisco.com/t5/network-access-control/restrict-tls-version-in-radius-policy/m-p/4749300#M579068</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/485442"&gt;@Walker&lt;/a&gt;&amp;nbsp;, unfortunately as per the current versions of ISE&amp;nbsp; , such feature is not possible . If you go to the&amp;nbsp; menu displayed below (Administration&amp;gt;system&amp;gt;settings&amp;gt;security settings)&amp;nbsp; and enable/disable TLS versions, this is a configuration global that is implemented in all the nodes within your deployment and there is no way to restrict what you suggest by rules . What it will be ideal is that you update that device you mention using TLS 1.0 towards one of the newest versions .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RodrigoDiaz_0-1672865229393.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/172528iCFADCE7FDAD9798B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="RodrigoDiaz_0-1672865229393.png" alt="RodrigoDiaz_0-1672865229393.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Let me know if that helped you .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2023 20:48:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restrict-tls-version-in-radius-policy/m-p/4749300#M579068</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2023-01-04T20:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict TLS version in RADIUS Policy</title>
      <link>https://community.cisco.com/t5/network-access-control/restrict-tls-version-in-radius-policy/m-p/4749596#M579084</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/632778"&gt;@Rodrigo Diaz&lt;/a&gt;&amp;nbsp;Thanks for confirmation. We have already pressed the vendor to update to TLSv1.2 but I suspect that won't happen anytime soon.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2023 13:12:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restrict-tls-version-in-radius-policy/m-p/4749596#M579084</guid>
      <dc:creator>Walker</dc:creator>
      <dc:date>2023-01-05T13:12:14Z</dc:date>
    </item>
  </channel>
</rss>

