<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 3.3 - Disabling support for TLS 1.0 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5305209#M597077</link>
    <description>&lt;P&gt;Arne,&lt;/P&gt;&lt;P&gt;We do use DNAC and This is exactly the type of information I was hoping for when I posted this. Thanks a ton.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 03 Jul 2025 12:01:32 GMT</pubDate>
    <dc:creator>pmcternan</dc:creator>
    <dc:date>2025-07-03T12:01:32Z</dc:date>
    <item>
      <title>ISE 3.3 - Disabling support for TLS 1.0</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5304857#M597054</link>
      <description>&lt;P&gt;I plan to disable support for TLS 1.0 under the security settings. I am using ISE 3.3 and was wondering if there is anyway to see or detect if anything is connecting to ISE is still using TLS 1.0. Weather it be pxGrid or Context visibility I'll need to verify this to satisfy CC standards. Also, if I do disable it will this cause a reboot?&lt;/P&gt;&lt;P&gt;Thanks in advance.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 12:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5304857#M597054</guid>
      <dc:creator>pmcternan</dc:creator>
      <dc:date>2025-07-02T12:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 - Disabling support for TLS 1.0</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5304923#M597058</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;-&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1178373"&gt;@pmcternan&lt;/a&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;FYI :&amp;nbsp;&lt;A href="https://testtls.com/" target="_blank"&gt;https://testtls.com/&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;A href="https://www.cdn77.com/tls-test" target="_blank"&gt;https://www.cdn77.com/tls-test&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Changing TLS parameters (if it can be done) &lt;FONT color="#008000"&gt;&lt;EM&gt;will not cause&amp;nbsp; a reboot ,&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; M.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 15:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5304923#M597058</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2025-07-02T15:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 - Disabling support for TLS 1.0</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5304926#M597059</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/td-p/4305157" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/cisco-ise-pic-how-to-disable-tls-1-0-and-possibly-tls-1-1/td-p/4305157&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 15:48:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5304926#M597059</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-02T15:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 - Disabling support for TLS 1.0</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5305009#M597062</link>
      <description>&lt;P&gt;Well done for wanting to disable TLS 1.0 (as well as TLS 1.1 I assume).&lt;/P&gt;
&lt;P&gt;When I have done this in the past, I found that there were still clients that negotiated this old protocol and I wasn't aware of it - then had to re-enable TLS 1.0/1.1&lt;/P&gt;
&lt;P&gt;Changing this setting will restart application services on ALL nodes at the same time - yes ... &lt;STRONG&gt;ALL ISE nodes at the same time&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1751491028878.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/247475iB7C90087164C7F57/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1751491028878.png" alt="ArneBier_0-1751491028878.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my case, the clients that were preventing me to turn off TLS 1.0 were:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;DNAC / Catalyst Center - if DNAC has provisioned your devices with RADIUS settings, then PAC (Protected Access Credential) will be configured on NAD - this involves TLS 1.0 and EAP-FAST - in ISE 3.4 and IOS-XE 17.15.1 there is PAC-Less Provisioning - however, there is no version of DNAC/CatC that supports this yet&lt;/LI&gt;
&lt;LI&gt;Old Cisco desk phones - workaround would be to use MAB instead of 802.1X - but that makes security even worse&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;How to detect what systems are reliant on using TLS when speaking to ISE?&amp;nbsp; If you're talking about 802.1X clients, then you need to enable SYSLOG forwarding for successful RADIUS authentications to a SYSLOG server and check the events - they contain attributes similar to "days remaining=xxx" (I don't recall the exact string) and also TLS version and cipher details. It's very handy.&lt;/P&gt;
&lt;P&gt;But you must configure your ISE Authorization Profiles to re-auth &lt;STRONG&gt;WIRED endpoints&lt;/STRONG&gt; periodically (e.g. reauth every 65535 seconds) to get these SYSLOG events. If you don't reauth 802.1X wired clients then you might have missed the auth that could have potentially happened a long time ago when the devices was first connected to a switch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Web-based clients should not be using TLS 1.0 (e.g. web browsers from guests) - that must be some ancient equipment I would not want on my network. The focus should be on 802.1X clients, and also DNAC (if you're using it)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 21:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5305009#M597062</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-07-02T21:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 - Disabling support for TLS 1.0</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5305209#M597077</link>
      <description>&lt;P&gt;Arne,&lt;/P&gt;&lt;P&gt;We do use DNAC and This is exactly the type of information I was hoping for when I posted this. Thanks a ton.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2025 12:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5305209#M597077</guid>
      <dc:creator>pmcternan</dc:creator>
      <dc:date>2025-07-03T12:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 - Disabling support for TLS 1.0</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5316673#M597600</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1178373"&gt;@pmcternan&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;please take a look at:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-what-we-need-to-know-about-tls/ta-p/5316668" target="_blank" rel="noopener"&gt;ISE - What we need to know about TLS&lt;/A&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;About:&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;"&lt;EM&gt; ...&amp;nbsp;if there is anyway to see or detect if anything is connecting to ISE is still using TLS 1.0 ...&lt;/EM&gt; ", search the above link for&amp;nbsp;&lt;STRONG&gt;Identify the TLS version&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;"&lt;EM&gt; ...&amp;nbsp;do disable it will this cause a reboot ? ...&lt;/EM&gt; ", search the above link for &lt;STRONG&gt;Particularities &amp;gt; Version&lt;/STRONG&gt; and&amp;nbsp;&lt;STRONG&gt;Particularities &amp;gt; Ciphers List&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Aug 2025 05:37:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-disabling-support-for-tls-1-0/m-p/5316673#M597600</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2025-08-02T05:37:21Z</dc:date>
    </item>
  </channel>
</rss>

