07-02-2021 04:08 AM
We've had an issue when implementing a new CISCO ISE RADIUS server, in which our supplicant devices are struggling to authenticate a connection. They use an SSL3 protocol to authenticate the connection, which is rejected by the Cisco server which is TLS1.1.
The error we got originally was this one:
This was fixed by adding a special kernel to the supplicant device, which added the complete openSSL package (v:1.0.0d)
This seemed to mean that the handshake wase made, but we got a new connection error after this:
Do you know how I can solve this error?
07-02-2021 10:55 AM
Please check your ISE server under Administration > System > Settings > Security Settings. there you will see boxes to enable TLS 1.0 and TLS 1.1. (TLS 1.2 is the default and preferred transport and cannot be changed.)
Hover over the information icon for each to see the affected services that potentially used the less secure TLS versions.
12-19-2024 09:22 AM
Thank you 10/10 person.
07-05-2021 10:15 AM
OpenSSL 1.0.0d was released in 2011 (10 years ago) so it's too old and has lots of vulnerabilities. Please update to a recent release.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide