<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE - How to disable Weak Ciphers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862214#M582478</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/194407"&gt;@Viru_Rajapur&lt;/a&gt; you can disable these ciphers, but this feature is only available from ISE 3.3, this has been announced and soon to be released.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/new_and_changed_info.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/new_and_changed_info.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/b_ISE_admin_33_segmentation.html#task_55FD724D084D4C4485B8E25B4560A79E" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/b_ISE_admin_33_segmentation.html#task_55FD724D084D4C4485B8E25B4560A79E&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Jun 2023 12:08:09 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2023-06-26T12:08:09Z</dc:date>
    <item>
      <title>Cisco ISE - How to disable Weak Ciphers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862194#M582477</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Problem Statement:&lt;/STRONG&gt; The vulnerability below were found in our ISE,&amp;nbsp; would like to know&amp;nbsp;&lt;STRONG&gt;&lt;U&gt;if there are any methods to disable them.&lt;/U&gt;&lt;/STRONG&gt; If not, is there &lt;STRONG&gt;&lt;U&gt;any roadmap from Cisco to get them fixed&lt;/U&gt;&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;ssl-static-key-ciphers&lt;/U&gt;&lt;/STRONG&gt; (TCP 443, 8443, 8444)&lt;/P&gt;
&lt;P&gt;- TLS_RSA_WITH_AES_128_CBC_SHA&lt;/P&gt;
&lt;P&gt;- TLS_RSA_WITH_AES_128_CBC_SHA256&lt;/P&gt;
&lt;P&gt;- TLS_RSA_WITH_AES_256_CBC_SHA&lt;/P&gt;
&lt;P&gt;- TLS_RSA_WITH_AES_256_CBC_SHA256&lt;/P&gt;
&lt;P&gt;- TLS_DHE_RSA_WITH_AES_128_CBC_SHA&lt;/P&gt;
&lt;P&gt;- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA&lt;/P&gt;
&lt;P&gt;- TLS_RSA_WITH_AES_128_CBC_SHA&lt;/P&gt;
&lt;P&gt;- TLS_RSA_WITH_AES_256_CBC_SHA&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;ssh-weak-message-authentication-code-algorithms&lt;/U&gt;&lt;/STRONG&gt; (TCP 22)&lt;/P&gt;
&lt;P&gt;- hmac-sha1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco ISE Version 3.0 patch 5&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 08:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862194#M582477</guid>
      <dc:creator>Viru_Rajapur</dc:creator>
      <dc:date>2023-06-26T08:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - How to disable Weak Ciphers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862214#M582478</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/194407"&gt;@Viru_Rajapur&lt;/a&gt; you can disable these ciphers, but this feature is only available from ISE 3.3, this has been announced and soon to be released.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/new_and_changed_info.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/new_and_changed_info.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/b_ISE_admin_33_segmentation.html#task_55FD724D084D4C4485B8E25B4560A79E" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/b_ISE_admin_33_segmentation.html#task_55FD724D084D4C4485B8E25B4560A79E&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 12:08:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862214#M582478</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-26T12:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - How to disable Weak Ciphers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862418#M582482</link>
      <description>&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=HXt2cjUFcp8&amp;amp;t=1s" target="_blank"&gt;https://www.youtube.com/watch?v=HXt2cjUFcp8&amp;amp;t=1s&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 12:30:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862418#M582482</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-06-26T12:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - How to disable Weak Ciphers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862450#M582485</link>
      <description>&lt;P&gt;Regarding&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;ssh-weak-message-authentication-code-algorithms&lt;/U&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(TCP 22)&lt;/P&gt;&lt;P&gt;- hmac-sha1&lt;/P&gt;&lt;P&gt;You can open a TAC case with Cisco and have a TAC engineer to root into the ISE and modidied the /etc/ssh/sshd_config file as follows:&lt;/P&gt;&lt;P&gt;Kexalgorithms curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256&lt;/P&gt;&lt;P&gt;MACs umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512&lt;/P&gt;&lt;P&gt;Ciphers chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes&lt;/P&gt;&lt;P&gt;BEFORE modifying /etc/ssh/sshd_config:&lt;BR /&gt;debug2: peer server KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group16-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1&lt;BR /&gt;debug2: host key algorithms: ssh-rsa,rsa-sha2-256,rsa-sha2-512&lt;BR /&gt;debug2: ciphers ctos: aes128-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes256-ctr&lt;BR /&gt;debug2: ciphers stoc: aes128-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes256-ctr&lt;BR /&gt;debug2: MACs ctos: hmac-sha2-512,hmac-sha2-256,&lt;STRONG&gt;hmac-sha1&lt;/STRONG&gt;&lt;BR /&gt;debug2: MACs stoc: hmac-sha2-512,hmac-sha2-256,&lt;STRONG&gt;hmac-sha1&lt;/STRONG&gt;&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com&lt;/P&gt;&lt;P&gt;After modifying /etc/ssh/sshd_config:&lt;BR /&gt;debug2: peer server KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256&lt;BR /&gt;debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519&lt;BR /&gt;debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512&lt;BR /&gt;debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com&lt;/P&gt;&lt;P&gt;Don't forget to restart sshd service with "service sshd restart".&amp;nbsp; Simple, right?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 12:46:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862450#M582485</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-06-26T12:46:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - How to disable Weak Ciphers</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862536#M582491</link>
      <description>&lt;P&gt;Thank you All for your generous help and letting me know the fix for this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 14:22:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-how-to-disable-weak-ciphers/m-p/4862536#M582491</guid>
      <dc:creator>Viru_Rajapur</dc:creator>
      <dc:date>2023-06-26T14:22:01Z</dc:date>
    </item>
  </channel>
</rss>

