<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: creating a new vmware repository for ISE 3.2 - FIPS 140 compliant? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5134324#M590205</link>
    <description>&lt;P&gt;In order to meet this requirements, you will need to setup the external SFTP server with the followings:&lt;/P&gt;&lt;P&gt;debug2: KEX algorithms: ecdh-sha2-nistp521&lt;BR /&gt;debug2: host key algorithms: ecdsa-sha2-nistp256&lt;BR /&gt;debug2: ciphers ctos: aes256-ctr,aes256-gcm@openssh.com&lt;BR /&gt;debug2: ciphers stoc: aes256-ctr,aes256-gcm@openssh.com&lt;BR /&gt;debug2: MACs ctos: hmac-sha2-256,hmac-sha2-512&lt;/P&gt;&lt;P&gt;Assuming the external server is a Ubuntu Linux server, you need to modify the /etc/ssh/sshd_config to:&lt;/P&gt;&lt;P&gt;Kexalgorithms ecdh-sha2-nistp384,ecdh-sha2-nistp521&lt;BR /&gt;HostKeyAlgorithms rsa-sha2-512,rsa-sha2-256&lt;BR /&gt;MACs hmac-sha2-256,hmac-sha2-512&lt;BR /&gt;Ciphers aes256-ctr,aes256-gcm@openssh.com&lt;/P&gt;&lt;P&gt;To make sure that your ISE server can only use these parameters, you need to open a TAC case with Cisco and have cisco "root" into the ISE and modify the /etc/ssh/ssh_config file to set it up so that it only uses the parameters.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By default, Cisco ISE can connect to external 140-2 FIPS sFTP server without any issues but let say someone changes the settings on the external sFTP server to make it NOT 140-2 FIPS compliant.&amp;nbsp; Well, Cisco ISE can still connect to the external SFTP server and nobody would know unless you run debug on on sshd.&amp;nbsp; By locking the ISE ssh client on the ise via /etc/ssh/ssh_config, you make sure that BOTH sides are FIPS 140-2.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that help.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jun 2024 20:22:46 GMT</pubDate>
    <dc:creator>adamscottmaster2013</dc:creator>
    <dc:date>2024-06-20T20:22:46Z</dc:date>
    <item>
      <title>creating a new vmware repository for ISE 3.2 - FIPS 140 compliant?</title>
      <link>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5134072#M590194</link>
      <description>&lt;P&gt;asking for my group to create a new vmware repository for our ISE 3.2 cluster (4 nodes = primary PAN/MnT &amp;amp; PSN and secondary PAN/MnT &amp;amp; PSN) and I see this note on Cisco Docs under "Create Repositories":&lt;/P&gt;&lt;P&gt;"Cisco ISE initiates outbound SSH or SFTP connections in FIPS mode even if FIPS mode is not enabled on ISE. Ensure that the remote SSH or SFTP servers that communicate with ISE allow FIPS 140 approved cryptographic algorithms. Cisco ISE uses embedded FIPS 140 validated cryptographic modules."&lt;/P&gt;&lt;P&gt;Anyone know if I need to request anything special in getting my vmware team to create my new repository? This cluster is being used for our PCI (payment card industry) environment and only does AAA but no NAC. Our vmware vsphere is version 8.0.2.00300&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 13:05:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5134072#M590194</guid>
      <dc:creator>NatalieNDeGennaro72244</dc:creator>
      <dc:date>2024-06-20T13:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: creating a new vmware repository for ISE 3.2 - FIPS 140 compliant?</title>
      <link>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5134081#M590196</link>
      <description>&lt;P&gt;From a technology perspective your ISE node will not be able to establish a SSH/SFTP connection to a repository if it doesn't support FIPS 140 compliant ciphers/algorithms. So as long as your VMware team sets up a repository which is FIPS 140 compliant&amp;nbsp;itself you should be within compliance.&lt;/P&gt;&lt;P&gt;EDIT: Note that I am not a compliance guru. If in doubt, check with your Cisco contact/account manager.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 13:39:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5134081#M590196</guid>
      <dc:creator>Torbjørn</dc:creator>
      <dc:date>2024-06-20T13:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: creating a new vmware repository for ISE 3.2 - FIPS 140 compliant?</title>
      <link>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5134242#M590202</link>
      <description>&lt;P&gt;Thank you Torbjorn, but I am looking for any direction I need to give my vmware team as to how the repository vm needs to be created and if any certain settings need to be configured on the new vm.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 17:53:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5134242#M590202</guid>
      <dc:creator>NatalieNDeGennaro72244</dc:creator>
      <dc:date>2024-06-20T17:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: creating a new vmware repository for ISE 3.2 - FIPS 140 compliant?</title>
      <link>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5134324#M590205</link>
      <description>&lt;P&gt;In order to meet this requirements, you will need to setup the external SFTP server with the followings:&lt;/P&gt;&lt;P&gt;debug2: KEX algorithms: ecdh-sha2-nistp521&lt;BR /&gt;debug2: host key algorithms: ecdsa-sha2-nistp256&lt;BR /&gt;debug2: ciphers ctos: aes256-ctr,aes256-gcm@openssh.com&lt;BR /&gt;debug2: ciphers stoc: aes256-ctr,aes256-gcm@openssh.com&lt;BR /&gt;debug2: MACs ctos: hmac-sha2-256,hmac-sha2-512&lt;/P&gt;&lt;P&gt;Assuming the external server is a Ubuntu Linux server, you need to modify the /etc/ssh/sshd_config to:&lt;/P&gt;&lt;P&gt;Kexalgorithms ecdh-sha2-nistp384,ecdh-sha2-nistp521&lt;BR /&gt;HostKeyAlgorithms rsa-sha2-512,rsa-sha2-256&lt;BR /&gt;MACs hmac-sha2-256,hmac-sha2-512&lt;BR /&gt;Ciphers aes256-ctr,aes256-gcm@openssh.com&lt;/P&gt;&lt;P&gt;To make sure that your ISE server can only use these parameters, you need to open a TAC case with Cisco and have cisco "root" into the ISE and modify the /etc/ssh/ssh_config file to set it up so that it only uses the parameters.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By default, Cisco ISE can connect to external 140-2 FIPS sFTP server without any issues but let say someone changes the settings on the external sFTP server to make it NOT 140-2 FIPS compliant.&amp;nbsp; Well, Cisco ISE can still connect to the external SFTP server and nobody would know unless you run debug on on sshd.&amp;nbsp; By locking the ISE ssh client on the ise via /etc/ssh/ssh_config, you make sure that BOTH sides are FIPS 140-2.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that help.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 20:22:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5134324#M590205</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-06-20T20:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: creating a new vmware repository for ISE 3.2 - FIPS 140 compliant?</title>
      <link>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5135261#M590239</link>
      <description>&lt;P&gt;Thanks adamscottmaster2013! This information is exactly what I was looking for. I can now request the vm be created and then once it is I will put in a TAC case to get our ISE cluster configured. Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2024 12:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5135261#M590239</guid>
      <dc:creator>NatalieNDeGennaro72244</dc:creator>
      <dc:date>2024-06-24T12:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: creating a new vmware repository for ISE 3.2 - FIPS 140 compliant?</title>
      <link>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5135278#M590241</link>
      <description>&lt;P&gt;Actually, the new repository will be RHEL 8.2&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2024 12:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/creating-a-new-vmware-repository-for-ise-3-2-fips-140-compliant/m-p/5135278#M590241</guid>
      <dc:creator>NatalieNDeGennaro72244</dc:creator>
      <dc:date>2024-06-24T12:39:14Z</dc:date>
    </item>
  </channel>
</rss>

