<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable TLS1.0 and TLS1.1 from ISE 3.2 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5138527#M590358</link>
    <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/release_notes/b_ise_33_RN.html#c_disable_ciphers" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/release_notes/b_ise_33_RN.html#c_disable_ciphers&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 01 Jul 2024 14:57:46 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2024-07-01T14:57:46Z</dc:date>
    <item>
      <title>Disable TLS1.0 and TLS1.1 from ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5137274#M590304</link>
      <description>&lt;P&gt;We have a distributed ISE deployment with PAN, MNT and PSN nodes. all the ISE nodes are running on&amp;nbsp;&amp;nbsp;3.2.0.542 -patch-3.We already disabled the TLS1.0 and 1.1 from the security settings but still it's listening to the tls1.0/1.1 weak cipher as per the Vulnerability report. Please see the attachment.&lt;/P&gt;&lt;P&gt;VM team Performed a vulnerability scan for the ISE nodes to validate TLS vulnerabilities. However, TLS 1.0 and TLS 1.1 weak ciphers are still showing. attached the vulnerability&amp;nbsp; XML report. TLS 1.0 and 1.1 protocol matches are shown as True. TAC team was not able to figure it out this issue .. any suggestion ..&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2024 23:11:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5137274#M590304</guid>
      <dc:creator>ajaykumar-rath</dc:creator>
      <dc:date>2024-06-27T23:11:49Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS1.0 and TLS1.1 from ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5137526#M590314</link>
      <description>&lt;P&gt;You are on ISE 3.2 Patch 3 which is 1 year old. Patch 6 is the latest. First try that. I have a hard time believing TAC never mentioned this to you.&lt;/P&gt;
&lt;P&gt;TLS is used in &lt;EM&gt;a lot of different services&lt;/EM&gt; and neither you nor your vulnerability scan provide any specifics about which ports or scenarios you or the scanner were trying to use TLS.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2024 13:11:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5137526#M590314</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-06-28T13:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS1.0 and TLS1.1 from ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5137665#M590325</link>
      <description>&lt;P&gt;Thanks Thomas !!&lt;/P&gt;&lt;P&gt;ISE messaging service is enabled in the ISE. Is it possible that , this TLS1.0 and 1.1 version vulnerabilities are related to ISE messaging service ?&lt;/P&gt;&lt;P&gt;Vulnerability reported-&amp;nbsp;TLS/SSL Weak Message Authentication Code Cipher Suites&lt;/P&gt;&lt;P&gt;Transport Layer Security version 1.2 and earlier include support for cipher suites which use cryptographically weak Hash-based message authentication codes (HMACs), such as MD5 or SHA1.&lt;/P&gt;&lt;P&gt;TAC recommended to upgrade it to 3.3 in which there is an option to disable weak ciphers. But that is not available in version-3.2&lt;/P&gt;&lt;P&gt;NMAP output from one ISE node as below -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PORT STATE SERVICE&lt;BR /&gt;443/tcp open https&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.0:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| cipher preference: server&lt;BR /&gt;| warnings:&lt;BR /&gt;| Key exchange (dh 2048) of lower strength than certificate key&lt;BR /&gt;| Key exchange (secp256r1) of lower strength than certificate key&lt;BR /&gt;| TLSv1.1:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| cipher preference: server&lt;BR /&gt;| warnings:&lt;BR /&gt;| Key exchange (dh 2048) of lower strength than certificate key&lt;BR /&gt;| Key exchange (secp256r1) of lower strength than certificate key&lt;BR /&gt;| TLSv1.2:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| cipher preference: server&lt;BR /&gt;| warnings:&lt;BR /&gt;| Key exchange (dh 2048) of lower strength than certificate key&lt;BR /&gt;| Key exchange (secp256r1) of lower strength than certificate key&lt;BR /&gt;|_ least strength: A&lt;BR /&gt;8443/tcp filtered https-alt&lt;BR /&gt;8444/tcp filtered pcsync-http&lt;BR /&gt;8905/tcp closed unknown&lt;BR /&gt;9094/tcp filtered unknown&lt;BR /&gt;9095/tcp filtered unknown&lt;BR /&gt;MAC Address: 02:50:41:00:00:02 (Unknown)&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2024 17:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5137665#M590325</guid>
      <dc:creator>ajaykumar-rath</dc:creator>
      <dc:date>2024-06-28T17:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS1.0 and TLS1.1 from ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5138527#M590358</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/release_notes/b_ise_33_RN.html#c_disable_ciphers" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/release_notes/b_ise_33_RN.html#c_disable_ciphers&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 14:57:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5138527#M590358</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-07-01T14:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: Disable TLS1.0 and TLS1.1 from ISE 3.2</title>
      <link>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5138605#M590363</link>
      <description>&lt;P&gt;I am running ISE 3.2 patch 4 with TLS 1.0/1.1 disable and when I use nmap to scan the system, it only returns TLS v1.2:&lt;/P&gt;&lt;P&gt;Host is up (0.0060s latency).&lt;/P&gt;&lt;P&gt;PORT STATE SERVICE&lt;BR /&gt;443/tcp open https&lt;BR /&gt;| ssl-enum-ciphers:&lt;BR /&gt;| TLSv1.2:&lt;BR /&gt;| ciphers:&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A&lt;BR /&gt;| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A&lt;BR /&gt;| TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A&lt;BR /&gt;| TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A&lt;BR /&gt;| compressors:&lt;BR /&gt;| NULL&lt;BR /&gt;| cipher preference: server&lt;BR /&gt;| warnings:&lt;BR /&gt;| Key exchange (dh 2048) of lower strength than certificate key&lt;BR /&gt;| Key exchange (secp256r1) of lower strength than certificate key&lt;BR /&gt;|_ least strength: A&lt;/P&gt;&lt;P&gt;Nmap done: 1 IP address (1 host up) scanned in 1.61 seconds&lt;/P&gt;&lt;P&gt;I also have ISE 3.0 patch-3 system with TLS 1.0/1.1 OFF and the scan returned only TLS 1.2.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 19:44:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/disable-tls1-0-and-tls1-1-from-ise-3-2/m-p/5138605#M590363</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-07-01T19:44:14Z</dc:date>
    </item>
  </channel>
</rss>

