<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE 3.X and TLS 1.2 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4943923#M584709</link>
    <description>&lt;P&gt;All the Nodes require reboot after you disabled TLS v 1.0 and 1.1 on ISE GUI?&lt;/P&gt;</description>
    <pubDate>Thu, 19 Oct 2023 06:46:05 GMT</pubDate>
    <dc:creator>kakada Atada</dc:creator>
    <dc:date>2023-10-19T06:46:05Z</dc:date>
    <item>
      <title>Cisco ISE 3.X and TLS 1.2</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4723310#M578310</link>
      <description>&lt;P&gt;Due to a vulnerability scan, I am tasked with upgrading the TLS version on multiple hosts, one being ISE. Does ISE 3.1 support TLS version 1.2 or 1.3? I can see in the security setting in ISE I am only given the options to allow TLS 1.0 and TLS 1.1&lt;/P&gt;
&lt;P&gt;This is all new to me so bear with me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 16:49:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4723310#M578310</guid>
      <dc:creator>brazju</dc:creator>
      <dc:date>2022-11-17T16:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.X and TLS 1.2</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4723430#M578323</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1432124"&gt;@brazju&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Starting from ISE v2.x (I believe even from 1.x), there is a support for TLSv1.2. With newer releases (e.g. v3.x) TLSv1.2 is default version. You can enable older protocols, if you need to do so (thus options for v1.1 and 1.0), but, if you want to use v1.2, you actually don't need to do anything.&lt;/P&gt;
&lt;P&gt;What you should strive for is applying latest patch for your system, because these patches, quite often, are fixing security vulnerabilities as well, next to fixing bugs.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 20:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4723430#M578323</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-11-17T20:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.X and TLS 1.2</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4943923#M584709</link>
      <description>&lt;P&gt;All the Nodes require reboot after you disabled TLS v 1.0 and 1.1 on ISE GUI?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 06:46:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4943923#M584709</guid>
      <dc:creator>kakada Atada</dc:creator>
      <dc:date>2023-10-19T06:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.X and TLS 1.2</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4943944#M584710</link>
      <description>&lt;P&gt;&lt;SPAN&gt;All the Nodes require reboot after you disabled TLS v 1.0 and 1.1 on ISE GUI?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 07:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4943944#M584710</guid>
      <dc:creator>kakada Atada</dc:creator>
      <dc:date>2023-10-19T07:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.X and TLS 1.2</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4944521#M584735</link>
      <description>&lt;P&gt;Yes, when changing TLS settings, you will see this message.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-10-20 at 7.48.00 am.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/200153i00C885056580FCB6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2023-10-20 at 7.48.00 am.png" alt="Screenshot 2023-10-20 at 7.48.00 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You should ensure that all of your infrastructure also uses TLS 1.2 as well. I had a customer disable TLS 1.1 and immediately had endpoints that could no longer authenticate.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 21:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4944521#M584735</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-10-19T21:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.X and TLS 1.2</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4944626#M584744</link>
      <description>&lt;P&gt;Dear&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your update.&lt;/P&gt;&lt;P&gt;If we found endpoints are using TLS v 1.2 it will be working, still authentication?&lt;/P&gt;&lt;P&gt;How to resolve if some endpoint still TLS 1.0 and 1.1?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: if&amp;nbsp; in case we disabled TLS 1.0 and 1.1 on ISE 3.X&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 03:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4944626#M584744</guid>
      <dc:creator>kakada Atada</dc:creator>
      <dc:date>2023-10-20T03:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.X and TLS 1.2</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4944632#M584745</link>
      <description>&lt;P&gt;Endpoints supporting and configured to use TLS 1.2 should be fine.&lt;/P&gt;
&lt;P&gt;Endpoints that only support (or are configured for) TLS 1.0/1.1 will fail and will need to be tracked down and remediated.&lt;/P&gt;
&lt;P&gt;Due to the risks, this change should be made during a scheduled change window that is long enough to test as many different endpoints, flows, and integrated systems as possible.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 04:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4944632#M584745</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-10-20T04:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.X and TLS 1.2</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4944637#M584746</link>
      <description>&lt;P&gt;Dear&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I am agree with your statement.&lt;/P&gt;&lt;P&gt;How to set up rollback for endpoints contain with TLS 1.0 /1.1?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Require to enable back TLS v 1.0 / 1.1 on ISE 3.x GUI or else?&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 04:07:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4944637#M584746</guid>
      <dc:creator>kakada Atada</dc:creator>
      <dc:date>2023-10-20T04:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.X and TLS 1.2</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4944644#M584747</link>
      <description>&lt;P&gt;Yes. You would either have to fix the endpoints or re-enable the TLS 1.0/1.1 support on ISE (which will require another Application Server restart on all the nodes)&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 04:18:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/4944644#M584747</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-10-20T04:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.X and TLS 1.2</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/5232546#M593582</link>
      <description>&lt;P&gt;I know this thread is old but ..&lt;BR /&gt;ISE 3.2 patch 5 (will be 7 shortly).&amp;nbsp;&lt;BR /&gt;Disabling TLS 1.0 and 1.1 causes a restart.&lt;BR /&gt;Do we know if this is all nodes simultaneously?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 17:17:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-x-and-tls-1-2/m-p/5232546#M593582</guid>
      <dc:creator>BakerDW01</dc:creator>
      <dc:date>2024-12-04T17:17:13Z</dc:date>
    </item>
  </channel>
</rss>

