<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE and TLSv1.3 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/5084921#M589168</link>
    <description>&lt;P&gt;ISE 3.3 Patch 2 now supports TLSv1.3 for Cisco ISE Workflows (and not just for the Admin GUI).&lt;/P&gt;</description>
    <pubDate>Tue, 30 Apr 2024 20:07:47 GMT</pubDate>
    <dc:creator>florian.nolting</dc:creator>
    <dc:date>2024-04-30T20:07:47Z</dc:date>
    <item>
      <title>Cisco ISE and TLSv1.3</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4940036#M584606</link>
      <description>&lt;P&gt;Anyone know when Cisco ISE will start supporting TLSv1.3?&amp;nbsp; I am running ISE 3.2 patch-3 and it seems like TLSv1.2 is the highest it can go:&lt;/P&gt;&lt;P&gt;nmap --script ssl-enum-ciphers -p 443 isenode1.cisco.com&lt;BR /&gt;Starting Nmap 7.80 ( &lt;A href="https://nmap.org" target="_blank"&gt;https://nmap.org&lt;/A&gt; ) at 2023-10-13 13:10 EDT&lt;BR /&gt;Nmap scan report for isenode1 (192.168.1.1)&lt;BR /&gt;Host is up (0.00068s latency).&lt;/P&gt;&lt;P&gt;PORT STATE SERVICE&lt;BR /&gt;443/tcp open https&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.2:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| cipher preference: server&lt;BR /&gt;|_ least strength: A&lt;/P&gt;&lt;P&gt;Nmap done: 1 IP address (1 host up) scanned in 0.53 seconds&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 17:18:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4940036#M584606</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-10-13T17:18:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and TLSv1.3</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4940049#M584607</link>
      <description>&lt;P&gt;I heard that ISE 3.3 support TLS 1.3 worth checking release notes and configuration guide.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 17:38:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4940049#M584607</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-10-13T17:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and TLSv1.3</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4940113#M584608</link>
      <description>&lt;P&gt;Allow TLS 1.3: Allows TLS 1.3 for administrator HTTPS access over port 443 for:&lt;/P&gt;&lt;P&gt;Cisco ISE Admin GUI&lt;/P&gt;&lt;P&gt;APIs enabled for port 443 (Open API, ERS, MnT)&lt;/P&gt;&lt;P&gt;Note&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;BR /&gt;AAA communications and all types of internode communications do not support TLS 1.3.&lt;/P&gt;&lt;P&gt;Enable TLS 1.3 on Cisco ISE and the relevant clients and servers for admin access over TLS 1.3.&lt;/P&gt;&lt;P&gt;That's not what I want.&amp;nbsp; Can it support TLSv1.3 for things besides "administration"?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 19:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4940113#M584608</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-10-13T19:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and TLSv1.3</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4940189#M584609</link>
      <description>&lt;P&gt;What is documented is all that is currently supported. This type of enhancement requires significant development effort and regression testing, and feature roadmap is not discussed in this public forum.&lt;/P&gt;</description>
      <pubDate>Sat, 14 Oct 2023 02:51:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4940189#M584609</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-10-14T02:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and TLSv1.3</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4941347#M584633</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;have you seen operating systems that are using 802.1X supplicants capable of TLS 1.3 ?&lt;/P&gt;
&lt;P&gt;I have not tried this yet, but the latest WPA Supplicant has TLS 1.3 support - worth running that against ISE 3.3 to see how it handles the TLS establishment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2023 20:06:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4941347#M584633</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-10-16T20:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and TLSv1.3</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4942136#M584650</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;:&amp;nbsp; Yes, we implement 802.1x with our Xerox copiers and Xerox devices are capable of TLSv1.3 and we want to implement TLSv1.3 on ISE but the option is not available.&amp;nbsp; Other vendors, beside Cisco, already support TLSv1.3.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're going to deploy ISE 3.2 patch-3 next month.&amp;nbsp; I think we will skip version 3.3 and probably switch vendor, not Cisco, the next time around.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 13:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4942136#M584650</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-10-17T13:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and TLSv1.3</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4946919#M584823</link>
      <description>&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/networking/technologies/extensible-authentication-protocol/windows-11-changes" target="_self"&gt;Here&lt;/A&gt; Microsoft states that Windows 11 uses TLS1.3 (&lt;STRONG&gt;&lt;A href="https://support.microsoft.com/windows/faster-and-more-secure-wi-fi-in-windows-26177a28-38ed-1a8e-7eca-66f24dc63f09" target="_blank" rel="noopener" data-linktype="external"&gt;WiFi Security&lt;/A&gt;&lt;/STRONG&gt;)&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 14:05:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/4946919#M584823</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2023-10-24T14:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and TLSv1.3</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/5084921#M589168</link>
      <description>&lt;P&gt;ISE 3.3 Patch 2 now supports TLSv1.3 for Cisco ISE Workflows (and not just for the Admin GUI).&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 20:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-tlsv1-3/m-p/5084921#M589168</guid>
      <dc:creator>florian.nolting</dc:creator>
      <dc:date>2024-04-30T20:07:47Z</dc:date>
    </item>
  </channel>
</rss>

