<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Legacy Operating Systems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/legacy-operating-systems/m-p/4604418#M1089808</link>
    <description>&lt;P&gt;This is not easy or practical to do from FMC. You would need an accurate fingerprint identification of each host on the network, something that can potentially be done with nmap but prone to false positive/negative. Also, it only applies to hosts whose traffic transits the managed firewall(s).&lt;/P&gt;
&lt;P&gt;This sort of thing is more commonly done with a network access control (NAC) solution such as Cisco ISE using the Posture feature.&lt;/P&gt;</description>
    <pubDate>Wed, 04 May 2022 13:37:05 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2022-05-04T13:37:05Z</dc:date>
    <item>
      <title>Legacy Operating Systems</title>
      <link>https://community.cisco.com/t5/network-security/legacy-operating-systems/m-p/4604416#M1089807</link>
      <description>&lt;P&gt;FMC Policy to block legacy operating systems from network access. How can I create a policy to block operating systems such as XP, Vista etc... ?&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2022 13:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/legacy-operating-systems/m-p/4604416#M1089807</guid>
      <dc:creator>mbenz</dc:creator>
      <dc:date>2022-05-04T13:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy Operating Systems</title>
      <link>https://community.cisco.com/t5/network-security/legacy-operating-systems/m-p/4604418#M1089808</link>
      <description>&lt;P&gt;This is not easy or practical to do from FMC. You would need an accurate fingerprint identification of each host on the network, something that can potentially be done with nmap but prone to false positive/negative. Also, it only applies to hosts whose traffic transits the managed firewall(s).&lt;/P&gt;
&lt;P&gt;This sort of thing is more commonly done with a network access control (NAC) solution such as Cisco ISE using the Posture feature.&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2022 13:37:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/legacy-operating-systems/m-p/4604418#M1089808</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-05-04T13:37:05Z</dc:date>
    </item>
  </channel>
</rss>

