<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to disable TLS 1.0 in ISE when DNAC is used to provision devic in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5194040#M591822</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;. I agree that is confusing to talk about the PAC in the PAC-less section. I would suggest submitting feedback on that doc (I have also done so).&lt;/P&gt;
&lt;P&gt;To be honest, the EAP-FAST PAC stuff has always been difficult for me to understand. All I can say, is that the PAC-less feature simplifies the communication by allowing the device and ISE to negotiate the connection by agreeing to use pacless with a shared secret instead. This not only removes the need for the PAC creation/negotiation, but removes multiple steps in the handshake.&lt;/P&gt;
&lt;P&gt;I saw this basic diagram internally that shows the updated negotiation.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-09-13 at 9.10.12 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229055i716CA8FCB5EECD08/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-09-13 at 9.10.12 AM.png" alt="Screenshot 2024-09-13 at 9.10.12 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 12 Sep 2024 23:22:16 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2024-09-12T23:22:16Z</dc:date>
    <item>
      <title>How to disable TLS 1.0 in ISE when DNAC is used to provision devices?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5192998#M591770</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;I'm sure all of us would love to disable TLS 1.0/1.1 support in ISE to imrove security, but there's always something in the network that seems to make this dream impossible.&amp;nbsp; I discovered today that CTS uses EAP-FAST under the covers, and on the 3850 that I was capturing the traffic, it was using TLS 1.0 in the TLS Handshake Client Hello.&amp;nbsp; &lt;STRONG&gt;I never wanted CTS and I have no need for it, but because all the devices are provisioned with the latest version of DNAC, we get CTS whether we like it or not.&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Is it possible to disable the CTS stuff when provisioning network devices?&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Is there a TLS 1.2 version of EAP-FAST for CTS ?&amp;nbsp; Some of our network switches are 3850 and 16.12 is the latest IOS-XE.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I read in some Community post that CTS can be done via REST API but you need IOS-XE 17.X - even if I had a network with that version of code, does DNAC do all the hard work, and then no longer uses EAP-FAST ?&lt;/P&gt;
&lt;P&gt;thanks for any advice&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 06:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5192998#M591770</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-11T06:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable TLS 1.0 in ISE when DNAC is used to provision devic</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5193023#M591773</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - FYI :&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/release_notes/b_ise_33_RN.html#c_disable_ciphers" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/release_notes/b_ise_33_RN.html#c_disable_ciphers&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;STRONG&gt;&amp;nbsp; Ref&lt;/STRONG&gt; :&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/b_ISE_admin_33_segmentation.html#t_security_settings_33" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/b_ISE_admin_33_segmentation.html#t_security_settings_33&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;gt;...&lt;STRONG&gt;TLS 1.2 is the latest supported TLS version when EAP-TLS is used as the inner method for EAP-FAST, TEAP, and PEAP protocols.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 07:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5193023#M591773</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-09-11T07:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable TLS 1.0 in ISE when DNAC is used to provision devic</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5193039#M591774</link>
      <description>&lt;P&gt;Yeah ISE 3.3 is not the problem. TLS is negotiated by both sides of the connection. My concern is with DNAC because it's forcing EAP-FAST on me whether I like it or not. Without EAP-FAST in the mix I could easily disable TLS 1.0&lt;/P&gt;
&lt;P&gt;And there are various versions of IOS/IOS-XE/AireOS that still use older versions of TLS - that is the issue. People should really think twice before disabling TLS 1.0&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 07:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5193039#M591774</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-11T07:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable TLS 1.0 in ISE when DNAC is used to provision devic</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5193456#M591794</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt; , ISE 3.4 added an enhancement for &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-4/release_notes/b_ise_34_RN.html#concept_czx_1nt_11c" target="_blank" rel="noopener"&gt;PAC-less RADIUS communications for TrustSec&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;I would expect the plan for Catalyst Center will be to implement this method to mitigate issues around the requirement for TLS 1.0 in the EAP-FAST PAC communication.&lt;BR /&gt;It is only supported on network devices with IOS-XE version 17.15.1 or higher so I realise that doesn't help with your 3850s, but that platform reaches End of Support next year so I don't think there are any options with those.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 22:12:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5193456#M591794</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-09-11T22:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable TLS 1.0 in ISE when DNAC is used to provision devic</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5193557#M591802</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not up-to-speed on the latest developments in CTS, so perhaps you can explain this in English for me. The &lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9600/software/release/17-15/configuration_guide/cts/b_1715_cts_9600_cg/cisco_trustsec_overview.html#Cisco_Concept.dita_1d70f0f9-9cd0-456e-b4e9-1fec7073b53f" target="_self"&gt;IOS-XE 17.15.1 CTS Guide has this paragraph&lt;/A&gt; that seems to contradict itself (it says you don't need PAC, and then it talks about how the PAC is created)&lt;/P&gt;
&lt;P&gt;EAP-FAST is still involved, but which version?&amp;nbsp; I am confused.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1726122823504.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228999i4C0693CF84679A3B/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1726122823504.png" alt="ArneBier_0-1726122823504.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 06:34:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5193557#M591802</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-12T06:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable TLS 1.0 in ISE when DNAC is used to provision devic</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5194040#M591822</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;. I agree that is confusing to talk about the PAC in the PAC-less section. I would suggest submitting feedback on that doc (I have also done so).&lt;/P&gt;
&lt;P&gt;To be honest, the EAP-FAST PAC stuff has always been difficult for me to understand. All I can say, is that the PAC-less feature simplifies the communication by allowing the device and ISE to negotiate the connection by agreeing to use pacless with a shared secret instead. This not only removes the need for the PAC creation/negotiation, but removes multiple steps in the handshake.&lt;/P&gt;
&lt;P&gt;I saw this basic diagram internally that shows the updated negotiation.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-09-13 at 9.10.12 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229055i716CA8FCB5EECD08/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-09-13 at 9.10.12 AM.png" alt="Screenshot 2024-09-13 at 9.10.12 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 23:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5194040#M591822</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-09-12T23:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable TLS 1.0 in ISE when DNAC is used to provision devic</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5194042#M591823</link>
      <description>&lt;P&gt;One good thing with using a PAC instead of a static shared secret in RADIUS server definitions, is that it makes decoding the user-password - I verified this by trying to decode a PAP auth password in Wireshark - not sure how strong the encryption is, but it keeps the wolves from the door a bit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I read elsewhere that in the wireless world, Cisco has updated the EAP-FAST of the AP authentication stack to use TLS 1.2.&amp;nbsp; But no mention of whether this will ever filter across all the IOS versions. Perhaps enough customer complaints have finally led to PAC-less.&lt;/P&gt;
&lt;P&gt;I am trying to get my hands on 8000v so I can test this in the lab. IOS-XE 17.15.1 + ISE 3.4 &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 23:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-tls-1-0-in-ise-when-dnac-is-used-to-provision/m-p/5194042#M591823</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-12T23:34:35Z</dc:date>
    </item>
  </channel>
</rss>

