<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ALLOWED PROTOCOL CONFIGURATION IN CISCO ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-configuration-in-cisco-ise/m-p/5209850#M592508</link>
    <description>&lt;P&gt;Depends on your use-case.&amp;nbsp; Do you need EAP-TTLS or not?&amp;nbsp; Do you need TEAP or not?&amp;nbsp; You 100% need to customize this to each individual policy set in your environment as needed.&lt;/P&gt;</description>
    <pubDate>Wed, 16 Oct 2024 20:28:55 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2024-10-16T20:28:55Z</dc:date>
    <item>
      <title>ALLOWED PROTOCOL CONFIGURATION IN CISCO ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-configuration-in-cisco-ise/m-p/5209802#M592503</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;I have checked in one endpoint live log. I have seen that the authentication protocol is PAP-ASCII but while checking on allowed protocols i have seen this why allow eap ttls allow teap everything is checked and what is the use of PAP-ASCII also&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="poornakumar_0-1729101891620.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/231448i765FB6861B41A8B8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="poornakumar_0-1729101891620.png" alt="poornakumar_0-1729101891620.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2024 18:05:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-configuration-in-cisco-ise/m-p/5209802#M592503</guid>
      <dc:creator>poornakumar</dc:creator>
      <dc:date>2024-10-16T18:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: ALLOWED PROTOCOL CONFIGURATION IN CISCO ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-configuration-in-cisco-ise/m-p/5209850#M592508</link>
      <description>&lt;P&gt;Depends on your use-case.&amp;nbsp; Do you need EAP-TTLS or not?&amp;nbsp; Do you need TEAP or not?&amp;nbsp; You 100% need to customize this to each individual policy set in your environment as needed.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2024 20:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-configuration-in-cisco-ise/m-p/5209850#M592508</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-10-16T20:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: ALLOWED PROTOCOL CONFIGURATION IN CISCO ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-configuration-in-cisco-ise/m-p/5209939#M592513</link>
      <description>&lt;P&gt;PAP is considered insecure form of authentication since username/password is sent in cleartext, for ISE usually Guest connections handled through a web authentication portal and may use PAP-ASCII , the communication is usually protected via HTTPS (SSL/TLS) encryption to ensure the security of the credentials during transmission.&lt;/P&gt;
&lt;P&gt;for other protocols, its recommended to enable the ones you need based on kind of authentication you are using.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 03:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-configuration-in-cisco-ise/m-p/5209939#M592513</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2024-10-17T03:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: ALLOWED PROTOCOL CONFIGURATION IN CISCO ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-configuration-in-cisco-ise/m-p/5210119#M592518</link>
      <description>&lt;P&gt;As mentioned by others the allowed protocol list should be matching what authentication protocols you are actually using in your environment. For instance if you are not using EAP-TTLS then you can deselect it. Same concept with any other protocol on that list. With regard to PAP, PAP is normally used with MAB, however, if PAP is listed under a secure protocol like with EAP-TTLS in the screenshot you shared, then PAP credentials in that case would be encrypted with the outer authentication protocol EAP-TTLS in this case.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 08:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-configuration-in-cisco-ise/m-p/5210119#M592518</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-17T08:58:14Z</dc:date>
    </item>
  </channel>
</rss>

