<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 3.2 patch-4 to patch-5 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055035#M588548</link>
    <description>What you would you find over a full week vs a couple of days? Your plan for shutdown/rebuild sounds good though?&lt;BR /&gt;&lt;BR /&gt;What do you mean 100% rollback? Each ISE patch includes rollback. I’ve personally never had issues rolling back a patch but I typically avoid it anyway I can.&lt;BR /&gt;</description>
    <pubDate>Tue, 02 Apr 2024 13:19:57 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2024-04-02T13:19:57Z</dc:date>
    <item>
      <title>ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5054532#M588522</link>
      <description>&lt;P&gt;I have the following SNS-3655 running ISE 3.2 patch-4:&lt;/P&gt;&lt;P&gt;ise1: Primary Admin/Primary MNT;&lt;BR /&gt;ise2: Secondary Amdin/Secondary MNT&lt;BR /&gt;ise3: PSN&lt;BR /&gt;ise4: PSN&lt;/P&gt;&lt;P&gt;I would like to do the followings:&lt;/P&gt;&lt;P&gt;- patch ise1 to patch-5; reboot&lt;BR /&gt;- patch ise3 to patch-5; reboot&lt;/P&gt;&lt;P&gt;After one week:&lt;BR /&gt;- patch ise4 to patch-5; reboot&lt;BR /&gt;- patch ise2 to patch-5; reboot&lt;/P&gt;&lt;P&gt;Can I have different nodes running different patches for one week? Is this something that Cisco supports?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2024 19:14:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5054532#M588522</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-04-01T19:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5054554#M588523</link>
      <description>&lt;P&gt;I can't answer on behalf of Cisco (or Cisco TAC) but I can't see why they would not allow this.&lt;/P&gt;
&lt;P&gt;Why one week?&amp;nbsp; Surely you'd know after a couple of days?&lt;/P&gt;
&lt;P&gt;I had an unfortunate incident the other day after upgrading a customer from 2.7 to 3.2p5 - upgrade went well, but some wireless Windows users were unable to connect on 3.2p5.&amp;nbsp; I didn't realise that this customer used AnyConnect NAM on Windows 10 hosts. To my horror, I saw in the ISE 3.2 release notes that AnyConnect 4.10.x was "supported" (what does that mean for older versions?) - but around half the PCs were running AnyConnect 4.9 (failing).&amp;nbsp; What on earth could make ISE 3.2 not work with a sub-version release of AnyConnect NAM?&amp;nbsp; ISE 3.2 had TLS1.0/1.1/SHA1 and all the legacy stuff enabled. But clients were failing to establish the TLS tunnel (clients gave up talking to ISE).&lt;/P&gt;
&lt;P&gt;Upgrading AnyConnect to the latest 4.10 release resolved the Windows connectivity issues.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2024 20:42:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5054554#M588523</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-04-01T20:42:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5054947#M588543</link>
      <description>&lt;P&gt;Agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;why a full week?&amp;nbsp; You can have nodes on different patch levels but you want this time to be as minimal as possible.&amp;nbsp; A week is way too long IMHO.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2024 12:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5054947#M588543</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-04-02T12:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5054987#M588545</link>
      <description>&lt;P&gt;Because for a full week, I can confidently identify all issues with patch-5.&amp;nbsp; If there are issues and in the worst case scenario, I can shutdown node ise1 and ise3, promote ise2 to be primary to rollback the change.&amp;nbsp; After that, I just need to rebuild ise1 and ise3.&lt;/P&gt;&lt;P&gt;I do NOT trust rolling back from patch-5 to patch-4.&amp;nbsp; I've had issues in the past about rolling back patches.&amp;nbsp; You're NOT going to get 100% rollback, am I right?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2024 12:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5054987#M588545</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-04-02T12:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055035#M588548</link>
      <description>What you would you find over a full week vs a couple of days? Your plan for shutdown/rebuild sounds good though?&lt;BR /&gt;&lt;BR /&gt;What do you mean 100% rollback? Each ISE patch includes rollback. I’ve personally never had issues rolling back a patch but I typically avoid it anyway I can.&lt;BR /&gt;</description>
      <pubDate>Tue, 02 Apr 2024 13:19:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055035#M588548</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-04-02T13:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055094#M588551</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;What do you mean 100% rollback? Each ISE patch includes rollback."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;LOL...&amp;nbsp; Have you ever tried to roll back on on the Cisco FTD devices? I've been burned about rollback so many times that it is not even funny anymore.&amp;nbsp; &amp;nbsp;The rollback from Cisco, or any vendors for that matter, is pretty much useless.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2024 16:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055094#M588551</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-04-02T16:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055129#M588552</link>
      <description>&lt;P&gt;I don't disagree and like I said I avoid rollbacks at all costs.&amp;nbsp; But FTD != ISE....&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2024 17:32:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055129#M588552</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-04-02T17:32:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055132#M588553</link>
      <description>&lt;P&gt;Just beware of this bug if you have Win 10 and TPM module in environment. Cisco is forgetting to take care of the work around they provided every time they are releasing new version or patch. If you have disabled RSA PSS, after patch it will be reenabled automatically and you need to disable it again.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbst.cloudapps.cisco.com%2Fbugsearch%2Fbug%2FCSCwb19635&amp;amp;data=05%7C02%7CPRADS%40equinor.com%7C4f7414a5a0c14251d7d008dc229d2219%7C3aa4a235b6e248d591957fcf05b459b0%7C0%7C0%7C638423305494436759%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;amp;sdata=3ejHfgh9jeCgbIKQByxpO9A10ykWmTrZKSFzZj6xfjw%3D&amp;amp;reserved=0" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb19635&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbst.cloudapps.cisco.com%2Fbugsearch%2Fbug%2FCSCwb77915&amp;amp;data=05%7C02%7CPRADS%40equinor.com%7C4f7414a5a0c14251d7d008dc229d2219%7C3aa4a235b6e248d591957fcf05b459b0%7C0%7C0%7C638423305494446789%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;amp;sdata=yVnXHTQ1L6Qs1RTHWhACUd94MXgYkKfCcMYz1UEzZjI%3D&amp;amp;reserved=0" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb77915&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2024 17:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055132#M588553</guid>
      <dc:creator>PSM</dc:creator>
      <dc:date>2024-04-02T17:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055209#M588554</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1048237"&gt;@PSM&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for that reminder - before I could confirm that the issue was due to AnyConnect, I thought for a minute that this could be my bug too. But I didn't see any RSA_PSS on the clients.&lt;/P&gt;
&lt;P&gt;If the workaround is to disable RSA_PSS on the clients (Windows config), do you know why there is also the option in ISE to disable RSA_PSS ? Is that only used/useful if the client has RSA_PSS enabled (and cannot disable it), so that ISE sends an EAP NAK, to force the client to use something else?&lt;/P&gt;
&lt;P&gt;I have never run into this with any of my customers that use the native Windows 10 supplicant, and very new laptops with the latest TPM modules. How does anyone land in this unfortunate situation in the first place?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2024 20:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055209#M588554</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-04-02T20:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055531#M588561</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp; yes, this workaround is when clients has RSA_PSS enabled and TPM has issue in signing during TLS handshake. This was to make the things easier for customers although this is actually a Microsoft issue. We discovered this issue 1st time when we were moving to 3.1 (patch 3 or 4 don't remember exactly). That time TAC engineer disabled RSA_PSS using root access of PSNs. In the next patches of 3.1, a new option using toggle switch was introduced by Cisco where customer can disable RSA_PSS using 'application configure ise' command. But the problem is that RSA_PSS setting is not retained every time you patch ISE and it has to set again.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 10:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055531#M588561</guid>
      <dc:creator>PSM</dc:creator>
      <dc:date>2024-04-03T10:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055823#M588570</link>
      <description>&lt;P&gt;For the RSA/PSS &lt;SPAN&gt;not preserved upon patch installation&lt;/SPAN&gt;, looking at the Bug CSCwf80386, it seems to be fixed on&amp;nbsp;&lt;SPAN&gt;003.003(000.430).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Looking into ISE 3.3 release notes I see:&lt;/P&gt;
&lt;P&gt;CSCwb77915 : Use the toggle button to enable or disable RSA PSS ciphers based on policy under Allowed Protocols in the Cisco ISE GUI.&lt;/P&gt;
&lt;P&gt;So maybe starting from ISE 3.3 they enabled the RSA/PSS toggle on the Web Gui and it's &lt;SPAN&gt;preserved &lt;/SPAN&gt;on future patch. I don't have a 3.3 version where to check, but maybe can someone check and confirm this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 20:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055823#M588570</guid>
      <dc:creator>CiscoU9834</dc:creator>
      <dc:date>2024-04-03T20:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.2 patch-4 to patch-5</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055983#M588573</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1478234"&gt;@CiscoU9834&lt;/a&gt;&amp;nbsp; looks new documentation bug. If you open detail in bug search tool it just explain same CLI work around.&lt;/P&gt;&lt;P&gt;And I checked 3.3, and cannot see option in allowed protocols.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PradeepSingh_0-1712211020946.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214865iBF1B8ED496A6A6EE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="PradeepSingh_0-1712211020946.png" alt="PradeepSingh_0-1712211020946.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 06:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-2-patch-4-to-patch-5/m-p/5055983#M588573</guid>
      <dc:creator>PSM</dc:creator>
      <dc:date>2024-04-04T06:11:40Z</dc:date>
    </item>
  </channel>
</rss>

