In ACS 5.4, cryptobinding TLV support was introduced to ensure that both the client and ACS participate in inner and outer EAP authentications for PEAP.
I see that on Windows 7 clients, a checkbox for checking if the cryptobinding TLV is used is available when configuring a wireless connection.
Does anyone know if there is a known exploit that this feature has been included to fix? I'd like to understand more about this if any one has any more information (Google has not been my friend on this occasion). As the feature is an optional tick-box on a Win7 client, it makes me wonder how much of threat this represents?
I'm faced with having to upgrade from ACS5.3 to 5.4 if this represents an attack vector against PEAP (which I'd prefer not to do unless necessary)
ProblemTaking a snapshot of ISE virtual machines is not supported but it still happens occasionally due to administrators taking a snapshot manually or an integrated technology that automatically takes snapshots to back up VMs. When taking a snapsho...
Hi all, Is it available on Stealthwatch 7 Client or web interface the ability to import the Netflow Exporters names? I found only the possibility to configure manually the name of each Netflow Exporter, but not a bulk configuration.
User Experience Enhancements
As part of Cisco Customer Experience program, we are working towards a more uniform user experience and terminology harmonization. This program runs across all Cisco security products.
We are ali...
Join us on Thursday, October 10 at 10 am PT to meet the CEO and Founder of Cisco's most recent security investment.
In today’s cybersecurity arms race, how does Cisco stay one step ahead in the battle against attackers? One key strategy is keeping tabs on...