Release Notes For Cisco Identity Services Engine, Release 2.3
Release Notes For Cisco Identity Services Engine, Release 2.3
Contents
These release notes supplement the Cisco ISE documentation that is included with the product hardware
and software release, and cover the following topics:
• Introduction, page 2
• New Features in Cisco ISE, Release 2.3, page 2
• System Requirements, page 9
• Installing Cisco ISE Software, page 15
• Upgrading to Release 2.3, page 16
• Cisco Secure ACS to Cisco ISE Migration, page 27
• Known Limitations, page 27
• Features Not Supported in Cisco ISE, Release 2.3, page 28
• Cisco ISE License Information, page 28
• Deployment Terminology, Node Types, and Personas, page 29
• Requirements for CA to Interoperate with Cisco ISE, page 30
• Cisco ISE Installation Files, Updates, and Client Resources, page 31
• Using the Bug Search Tool, page 34
• Cisco ISE, Release 2.3.0.298 Patch Updates, page 35
• Cisco ISE, Release 2.3 Open Caveats, page 37
• Resolved Caveats, page 41
• Documentation Updates, page 40
• Related Documentation, page 41
Introduction
The Cisco ISE platform is a comprehensive, next-generation, contextually-based access control solution.
It offers authenticated network access, profiling, posture, BYOD device onboarding (native supplicant
and certificate provisioning), guest management, device administration (TACACS+), and security group
access services along with monitoring, reporting, and troubleshooting capabilities on a single physical
or virtual appliance. Cisco ISE is available on two physical appliances with different performance
characterization, and also as software that can be run on a VMware server. You can add more appliances
to a deployment for performance, scale, and resiliency.
Cisco ISE has a scalable architecture that supports standalone and distributed deployments, but with
centralized configuration and management. It also allows for configuration and management of distinct
personas and services. This feature gives you the ability to create and apply services where they are
needed in the network, but still operate the Cisco ISE deployment as a complete and coordinated system.
For more information about the features that are supported in Cisco ISE 2.3, see Cisco Identity Services
Engine Administrator Guide, Release 2.3.
Note We have recalled ISE 2.3 patch 1 due to an issue we found after posting. An updated patch file has been
reposted, and the new file name is ise-patchbundle-2.3.0.298-Patch1-221754.SPA.x86_64.tar.gz. If you
already installed the previously posted patch, you MUST uninstall that patch, and install the new one.
Guest Enhancements
Guests can select a social login provider as a way to provide credentials as a self-registered guest, instead
of entering username and password in the guest portal. To enable this, you can configure a social media
site as an external identity source, and configure a portal that allows users to use that external identity
source (social login provider). Facebook is the social login provider supported by this release.
ISE imports the default self-signed certificate of that node to the trusted certificate store of Primary PAN.
If you do not want to use the default self-signed certificate, you can click Cancel Registration and
manually import the relevant certificate chain of that node to the trusted certificate store of Primary PAN.
Policy Sets
Network access policies have now been consolidated together under Policy Sets, which can be accessed
from Policy > Policy Sets. Each policy set is a container defined on the top level of the policy hierarchy,
under which all relevant Authentication and Authorization policy and policy exception rules for that set
are configured. Multiple rules can be defined for both authentication and authorization, all based on
conditions. Conditions and additional related configurations can now also be easily accessed and reused
directly from the new Policy Set interface.
For more information about the new policy model, see New Policy Model, page 17
Posture Enhancements
• Default policies added for anti-malware, application visibility, and firewall conditions.
• Default requirements added for application visibility, firewall, and USB conditions.
• Cisco Temporal Agent—By default, this temporal agent resides in the Cisco ISE ISO image, and is
uploaded to Cisco ISE during installation.
• Posture and client provisioning policies allow the matching of users and endpoints, including
Endpoint ID groups and endpoint custom attributes.
Note Allow TLS 1.0 option is disabled by default in Cisco ISE 2.3 and above. TLS 1.0 is not
supported for TLS based EAP authentication methods (EAP-TLS, EAP-FAST/TLS) and 802.1X
supplicants when this option is disabled. If you want to use the TLS based EAP authentication
methods in TLS 1.0, check the Allow TLS 1.0 check box in the Security Settings page
(Administration > System > Settings > Protocols > Security Settings).
• Allow TLS 1.1—Allows TLS 1.1 for communication with legacy peers for the following workflows:
– Cisco ISE is configured as EAP server
– Cisco ISE downloads CRL from HTTPS or secure LDAP server
– Cisco ISE is configured as secure syslog client
– Cisco ISE is configured as secure LDAP client
Note Allow TLS 1.1 option is disabled by default in Cisco ISE 2.3 and above. TLS 1.1 is not
supported for TLS based EAP authentication methods (EAP-TLS, EAP-FAST/TLS) and 802.1X
supplicants when this option is disabled. If you want to use the TLS based EAP authentication
methods in TLS 1.1, check the Allow TLS 1.1 check box in the Security Settings page
(Administration > System > Settings > Protocols > Security Settings).
• Allow SHA-1 ciphers—Allows SHA-1 ciphers for communication with legacy peers for the
following workflows:
– Cisco ISE is configured as EAP server
– Cisco ISE is configured as RADIUS DTLS server
– Cisco ISE is configured as RADIUS DTLS client
• Allow ECDHE-RSA ciphers—Allows ECDHE-RSA ciphers for communication with peers for the
following workflows:
– Cisco ISE is configured as EAP server
– Cisco ISE is configured as RADIUS DTLS server
– Cisco ISE is configured as RADIUS DTLS client
– Cisco ISE downloads CRL from HTTPS server
– Cisco ISE downloads CRL from secure LDAP server
– Cisco ISE is configured as secure TCP syslog client
– Cisco ISE is configured as secure LDAP client
It is recommended that you enable this option for enhanced security. This option is enabled by default.
• Allow 3DES ciphers—Allows 3DES ciphers for communication with peers for the following
workflows:
– Cisco ISE is configured as EAP server
– Cisco ISE is configured as RADIUS DTLS server
– Cisco ISE is configured as RADIUS DTLS client
– Cisco ISE downloads CRL from HTTPS server
– Cisco ISE downloads CRL from secure LDAP server
– Cisco ISE is configured as secure TCP syslog client
– Cisco ISE is configured as secure LDAP client
This option is enabled by default. Uncheck this check box for enhanced security.
• Accept certificates without validating purpose—When ISE acts as an EAP or RADIUS DTLS
server, client certificates are accepted without checking whether the Key Usage extension contains
keyAgreement bit for ECDHE-ECDSA ciphers or keyEncipherment bit for other ciphers. This
option is enabled by default.
• Allow DSS ciphers for ISE as a client—Allows DSS ciphers for communication with server for the
following workflows:
– Cisco ISE is configured as RADIUS DTLS client
– Cisco ISE downloads CRL from HTTPS server
– Cisco ISE downloads CRL from secure LDAP server
– Cisco ISE as secure TCP syslog client
– Cisco ISE as secure LDAP client
This option is enabled by default. Uncheck this check box for enhanced security.
• Allow legacy unsafe TLS renegotiation for ISE as a client—Allows communication with legacy TLS
servers that do not support safe TLS renegotiation for the following workflows:
– Cisco ISE downloads CRL from HTTPS server
– Cisco ISE downloads CRL from secure LDAP server
– Cisco ISE as secure TCP syslog client
– Cisco ISE as secure LDAP client
Upgrade Enhancements
Cisco ISE offers an Upgrade Readiness Tool (URT) that you can run to detect and fix any data upgrade
issues before you start the upgrade process. Most of the upgrade failures occur because of data upgrade
issues. The URT is designed to validate the data before upgrade to identify, and report or fix the issue,
wherever possible. The URT is available as a separate downloadable bundle that can be run on a
Secondary Policy Administration Node or Standalone Node. There is no downtime needed to run this
tool.
See the Cisco Identity Services Engine Upgrade Guide, Release 2.3 for more information.
Wireless Setup
ISE Wireless Setup provides a very intuitive workflow to quickly set up common wireless use cases, such
as, 802.1X, Guest, BYOD. In just a few steps, the setup workflow configures both ISE and a Cisco
wireless controller, for a working end-to-end flow.
Wireless Setup is supported only for new installations. The Wireless Setup menu does not appear, if you
upgrade to Cisco ISE 2.2 from an earlier release or restore ISE from a backup.
Note ISE Wireless Setup is beta software - please do not use Wireless Setup in production networks.
Note The Wireless Setup feature is disabled by default in Cisco Identity Services Engine, Release 2.2
cumulative patch 2.
System Requirements
• Supported Hardware, page 9
• Supported Virtual Environments, page 11
• Supported Browsers, page 11
• Support for Microsoft Active Directory, page 11
• Supported Anti-Virus and Anti-Malware Products, page 11
• Supported Cipher Suites, page 12
Note For more details on Cisco ISE hardware platforms and installation, see the Cisco Identity Services
Engine Hardware Installation Guide, Release 2.3.
Supported Hardware
Cisco ISE software is packaged with your appliance or image for installation. Cisco ISE, Release 2.3 is
shipped on the following platforms. After installation, you can configure Cisco ISE with specified
component personas (Administration, Policy Service, Monitoring, and pxGrid) on the platforms that are
listed in Table 1.
Note Legacy ACS and NAC appliances (including the Cisco ISE 3300 series) are not supported with Cisco
ISE, Release 2.0 and later releases.
Note If you are installing or upgrading Cisco ISE on an ESXi 5.x server, to support RHEL 7 as the Guest OS,
update the VMware hardware version to 9 or later. RHEL 7 is supported with VMware hardware version
9 and later.
Supported Browsers
Supported browsers for the Admin portal include:
• Mozilla Firefox version:
– 52.1.2 ESR
– 53.0.3 and above
• Google Chrome latest version
• Microsoft Internet Explorer 10.x and 11.x
If you are using Internet Explorer 10.x, enable TLS 1.1 and TLS 1.2, and disable SSL 3.0 and TLS
1.0 (Internet Options > Advanced).
Note Microsoft has ended support for Windows Server 2003 and 2003 R2. We recommend that you upgrade
Windows Server to a supported version.
Microsoft Active Directory version 2000 or its functional level is not supported by Cisco ISE.
Cisco ISE 2.3 supports Multi-Forest/Multi-Domain integration with Active Directory infrastructures to
support authentication and attribute collection across large enterprise networks. Cisco ISE 2.3 supports
up to 50 domain join points.
https://www.cisco.com/c/en/us/support/security/identity-services-engine/products-device-support-table
s-list.html
Note When using virtual machines (VMs), we recommend that the guest VMs have the correct time set using
an NTP server before installing the .ISO image or OVA file on the VMs.
Perform Cisco ISE initial configuration according to the instructions in the Cisco Identity Services
Engine Hardware Installation Guide, Release 2.3. Before you run the setup program, ensure that you
know the configuration parameters listed in Table 3.
Note For additional information on configuring and managing Cisco ISE, see Release-Specific Document,
page 41.
2. If at least one of the “outer parts” in the system are assigned a different allowed protocol than the
others, including the default part, then all original authentication rules are converted to 2.3 as
follows:
• Each of the “outer parts” is converted to a separate policy set in the new policy model. The new
policy set will be named based on the name of the original outer part for that specific new set. On
the Policy Set level for each policy set, the original outer part conditions and the Allowed Protocol
will be assigned. All inner parts for each outer part are converted to authentication rules, one to one,
as part of the authentication policy within their new policy set.
The following table demonstrates the conversion for an old set of standalone authentication rules
that use different allowed protocols (Scenario -2). In the table, each line is in the following format:
Name (Condition/Results)
For example for Authentication outer part 1 (Outer Condition/Allowed Protocol A):
– Name—Authentication outer part 1
– Condition—Outer Condition
– Results—Allowed Protocol A
Authentication inner part 2.1 (Inner Default Authentication outer part 2 (Outer Condition 2/Allowed Protocol B)
Condition 2.1/Identity Store A) Authentication Policy (container)
Authentication inner part 2.2 (Inner Authentication inner part 2.1 (Inner Condition 2.1/Identity Store A)
Condition 2.2/Identity Store A)
Authentication inner part 2.2 (Inner Condition 2.2/Identity Store A)
Authentication inner part 2.3 (Inner
Authentication inner part 2.3 (Inner Condition 2.3/Identity Store A)
Condition 2.3/Identity Store A)
Authentication inner 2 Default (No conditions/Identity Store B)
Authentication inner 2 Default (No
conditions/Identity Store B) Exception 1
Authentication outer part 3 (Outer Condition Authorization Policy (container)
3/Allowed Protocol C) Authorization Rule 1
Authentication inner 3 Default (No Authorization Rule 2
conditions/Identity Store B)
Default Authentication outer part 3 (Outer Condition 3/Allowed Protocol C)
Default Authentication Outer Part (No
conditions/Allowed Protocol A/Identity Store Authentication Policy (container)
C) Authentication inner 3 Default (No conditions/Identity Store B)
Exception 1 Exception 1
Authorization Rule 1 Authorization Policy (container)
Authorization Rule 2 Authorization Rule 1
Authorization Rule 2
Default (No conditions/Allowed Protocol A)
Authentication Policy (container)
Default Authentication Rule (No conditions/Identity Store C)
Exception 1
Authorization Policy (container)
Authorization Rule 1
Authorization Rule 2
Old policy set from Cisco ISE 2.2 or earlier New policy sets after upgrade to Cisco ISE 2.3
Policy Set A (Condition A/No results) Policy Set A (Condition A/Allowed Protocol A)
Authentication outer part 1 (Outer Condition Authentication Policy (container)
1/Allowed Protocol A)
Authentication outer part 1 - Authentication inner part
Authentication inner part 1.1 (Inner Condition 1.1 (Outer Condition 1 + Inner Condition 1.1/Identity
1.1/Identity Store A) Store A)
Authentication inner part 1.2 (Inner Condition Authentication outer part 1 - Authentication inner part
1.2/Identity Store A) 1.2 (Outer Condition 1 + Inner Condition 1.2/Identity
Store A)
Authentication inner part 1.3 (Inner Condition
1.3/Identity Store A) Authentication outer part 1 - Authentication inner part
1.3 (Outer Condition 1 + Inner Condition 1.3/Identity
Authentication inner 1 Default (No
Store A)
conditions/Identity Store B)
Authentication outer part 1 - Authentication inner 1
Authentication outer part 2 (Outer Condition
Default (Outer Condition 1/Identity Store B)
2/Allowed Protocol A)
Authentication outer part 2 - Authentication inner part
Authentication inner part 2.1 (Inner Condition
2.1 (Outer Condition 2 + Inner Condition 2.1/Identity
2.1/Identity Store A)
Store A)
Authentication inner part 2.2 (Inner Condition
Authentication outer part 2 - Authentication inner part
2.2/Identity Store A)
2.2 (Outer Condition 2 + Inner Condition 2.2/Identity
Authentication inner part 2.3 (Inner Condition Store A)
2.3/Identity Store A)
Authentication outer part 2 - Authentication inner part
Authentication inner 2 Default (No 2.3 (Outer Condition 2 + Inner Condition 2.3/Identity
conditions/Identity Store B) Store A)
Authentication outer part 3 (Outer Condition Authentication outer part 2 - Authentication inner 2
3/Allowed Protocol A) Default (Outer Condition 2/Identity Store B)
Authentication inner 3 Default (No Authentication outer part 3 - Authentication inner 3
conditions/Identity Store B) Default (Outer Condition 3/Identity Store B)
Default Authentication Outer Part (No Default Authentication Outer Part (No
conditions/Allowed Protocol A/Identity Store C) conditions/Identity Store C)
Exception 1 Exception 1
Authorization Rule 1 Authorization Policy (container)
Authorization Rule 2 Authorization Rule 1
Authorization Rule 2
• The newly upgraded policy set contains a list of authentication rules that are converted by combining
the outer and inner conditions from the original policy set. Each new authentication rule that is
created during conversion is named based on the name of the old outer part with the suffix including
the inner part name. For example, as in the table above, if the old policy set is called "Policy Set A,"
one of its authentication "outer parts" is called Outer Part 1, and one of its authentication "inner
parts" is called Inner Part 1, then the newly created authentication rule is called "Outer Part 1 – Inner
Part 1" within Policy Set A. In the same manner, if the old policy set is called "All Employees"
policy set, one of its authentication "outer parts" is called London, and one of its authentication
"inner parts" is called Wired - MAB, then the newly created authentication rule is called "London –
Wired-MAB" within the “All Employees” policy set. The Default outer part for the authentication
policy is converted as the default authentication rule. The system default policy rule appears as the
last rule in the entire authentication table, regardless of the other rules that were created or
converted, and this rule cannot be moved or deleted.
• The conditions defined on the outer part (based on which the authentication rules are matched) are
combined with the inner part conditions (which indicate the identity store to be used for
authentication). The new combined conditions are configured in a single authentication rule within
the policy set in the new model. A new individual rule within the policy set is created for each
separate outer part of the old policy set.
2. When there are two or more allowed protocols selected for the “outer parts” in a policy set, all
original policy sets are converted to ISE 2.3 as follows:
• Each “outer part” of each authentication rule within the old policy set is converted to a new, separate
policy set in the new model. This new policy set places the “conditions” from the same original
“outer part” under the Authentication Policy section in the new policy model.
The following table demonstrates the conversion for an old policy set from ISE 2.2 and previous
versions to ISE 2.3 (Scenario - 2):
Old policy set from Cisco ISE 2.2 or earlier New policy sets after upgrade to Cisco ISE 2.3
Policy Set A (Condition A/No results) Policy Set A - Authentication outer part 1 (Condition A + Outer condition
1/Allowed Protocol A)
Authentication outer part 1 (Outer
Condition 1/Allowed Protocol A) Authentication Policy (container)
Authentication inner part 1.1 (Inner Authentication inner part 1.1 (Inner Condition 1.1/Identity Store A)
Condition 1.1/Identity Store A) Authentication inner part 1.2 (Inner Condition 1.2/Identity Store A)
Authentication inner part 1.2 (Inner
Authentication inner part 1.3 (Inner Condition 1.3/Identity Store A)
Condition 1.2/Identity Store A)
Authentication inner 1 Default (No conditions/Identity Store B)
Authentication inner part 1.3 (Inner
Condition 1.3/Identity Store A) Exception 1
Authentication inner 1 Default (No Authorization Policy (container)
conditions/Identity Store B) Authorization Rule 1
Authentication outer part 2 (Outer Authorization Rule 2
Condition 2/Allowed Protocol A)
Policy Set A - Authentication outer part 2 (Condition A + Outer condition
Authentication inner part 2.1 (Inner 2/Allowed Protocol B)
Condition 2.1/Identity Store A)
Authentication Policy (container)
Authentication inner part 2.2 (Inner
Condition 2.2/Identity Store A) Authentication inner part 2.1 (Inner Condition 2.1/Identity Store A)
Authentication inner 2 Default (No Authentication inner part 2.2 (Inner Condition 2.2/Identity Store A)
conditions/Identity Store B) Authentication inner 2 Default (No conditions/Identity Store B)
Authentication outer part 3 (Outer Exception 1
Condition 3/Allowed Protocol A)
Authorization Policy (container)
Authentication inner 3 Default (No
Authorization Rule 1
conditions/Identity Store B)
Authorization Rule 2
Default Authentication Outer Part (No
conditions/Allowed Protocol A/Identity Policy Set A - Default Authentication outer part 3 (Condition A + Outer
Store C) Condition 3/Allowed Protocol C)
Exception 1 Authentication Policy (container)
Authorization Rule 1 Authentication inner 3 Default (No conditions/Identity Store B)
Authorization Rule 2 Exception 1
Authorization Policy (container)
Authorization Rule 1
Authorization Rule 2
Policy Set A - Default (Condition A/Allowed Protocol A)
Authentication Policy (container)
Default Authentication Rule (No conditions/Identity Store C)
Exception 1
Authorization Policy (container)
Authorization Rule 1
Authorization Rule 2
• Each new policy set that is created during conversion is named based on the name of the old policy
set from which it was extracted with the suffix including the outer part name. For example, as in the
table above, if the old policy set is called “Policy Set A” and one of its authentication “outer parts”
is called Outer Part 1, then the newly created policy set is called “Policy Set A – Outer Part 1.” In
the same manner, if the old policy set is called “London” and one of its authentication “outer parts”
is called Wired MAB, then the newly created policy set is called “London – Wired MAB.”
The Default outer part for each old policy set is also converted to a new policy set just as are all the
other outer parts, for example “London – Default”. The system default policy set appears as the last
policy set in the entire table, regardless of the other policy sets that were created or converted, and
cannot be moved or deleted.
• The conditions defined on the top level of the old policy set are combined with the outer
authentication part conditions, designed to select the correct allowed protocol. The new combined
conditions are configured in the top level rule for each new policy set in the new model. A new
individual policy set is created for each outer part of each old policy set.
If the first two sets don’t match, then the system checks “London –Default”. If “London – Default” does
not match, then the system checks “New York – Default”. The system only uses “Default” as the policy
if “New York – Default” also does not match.
The same logic is used to match and select the correct authentication and then the correct authorization
rules, beginning from the top of each table and checking each rule until a match is found. The default
rule is used, if no other rule is matched.
Note If you are installing Cisco ISE, Release 2.3 on Cisco SNS-3500 series appliances with ACS PIDs (Cisco
SNS-3515-ACS-K9 and Cisco SNS-3595-ACS-K9), you must update the BIOS and CIMC firmware on
the hardware appliance before you install Cisco ISE, Release 2.3. Refer to the Cisco Identity Services
Engine Hardware Installation Guide for information on how to update the BIOS and CIMC firmware.
Known Limitations
ECDSA Certificates
• ECDSA certificates that are used for EAP authentication are supported only for the endpoints with
Android version 6.x and later.
• Cisco ISE supports ECDSA certificates with key length 256 and 384 only. You can select the key
length in Administration > System > Certificates > Certificate Management > System
Certificates page.
Term Description
Service Specific feature that a persona provides such as network access, profiler,
posture, security group access, and monitoring.
Node Individual instance that runs the Cisco ISE software. Cisco ISE is available
as an appliance and also as software that can be run on a VMware server.
Each instance (either running on a Cisco ISE appliance or on a VMware
server) that runs the Cisco ISE software is called a node.
Persona Determines the services provided by a node. A Cisco ISE node can assume
any or all of the following personas: Administration, Policy Service,
Monitoring, and pxGrid.
Deployment Model Determines if your deployment is a standalone, high availability in
standalone (a basic two-node deployment), or distributed deployment.
– Monitoring—Enables Cisco ISE to function as a log collector and store log messages from all
the Administration and Policy Service personas on the Cisco ISE nodes in your network. This
persona provides advanced monitoring and troubleshooting tools that you can use to effectively
manage your network and resources.
A node with this persona aggregates and correlates the data that it collects to provide
meaningful reports. Cisco ISE allows a maximum of two nodes with this persona that can
assume primary or secondary roles for high availability. Both the primary and secondary
Monitoring personas collect log messages. In case the primary Monitoring persona goes down,
the secondary Monitoring persona automatically assumes the role of the primary Monitoring
persona.
Note At least one node in your distributed setup should assume the Monitoring persona. It is
recommended that the Monitoring persona be on a separate, designated node for higher
performance in terms of data collection and reporting.
– pxGrid—Cisco pxGrid is a method for network and security devices to share data with other
devices through a secure publish and subscribe mechanism. These services are applicable for
applications that are used external to ISE and that interface with pxGrid. The pxGrid services
can share contextual information across the network to identify the policies and to share
common policy objects. This extends the policy management.
Minimum
Number in a
Node / Persona Deployment Maximum Number in a Deployment
Administration 1 2 (Configured as a high-availability pair)
Monitor 1 2 (Configured as a high-availability pair)
Policy Service 1 • 2—when the Administration/Monitoring/Policy
Service personas are on the same primary/secondary
appliances
• 5—when Administration and Monitoring personas are
on same appliance
• 40—when each persona is on a dedicated appliance
pxGrid 0 2 (Configured as a high-availability pair)
You can change the persona of a node. See the “Set Up Cisco ISE in a Distributed Environment” chapter
in the Cisco Identity Services Engine Administrator Guide, Release 2.3 for information on how to
configure personas on Cisco ISE nodes.
• Online Certificate Status Protocol (OCSP) is supported. This is not directly used in BYOD, but a
CA which can act as an OCSP server can be used for certificate revocation.
Note EJBCA 4.x is not supported by Cisco ISE for proxy SCEP. EJBCA is supported by Cisco ISE
for standard EAP authentication like PEAP, EAP-TLS, and so on.
• If you use an enterprise PKI to issue certificates for Apple iOS devices, ensure that you configure
key usage in the SCEP template and enable the “Key Encipherment” option. For example, if you use
Microsoft CA, edit the Key Usage Extension in the certificate template. In the Encryption area, click
the Allow key exchange only with key encryption (key encipherment) radio button and also
check the Allow encryption of user data check box.
• Cisco ISE supports the use of RSASSA-PSS algorithm for trusted certificates and endpoint
certificates for EAP-TLS authentication. When you view the certificate, the signature algorithm is
listed as 1.2.840.113549.1.1.10 instead of the algorithm name.
However, if you use the Cisco ISE internal CA for the BYOD flow, the Admin certificate should not be
signed using the RSASSA-PSS algorithm (by an external CA). The Cisco ISE internal CA cannot verify
an Admin certificate that is signed using this algorithm and the request would fail.
To access the Cisco Download Software center and download the necessary software:
• Windows client machine agent installation files (including MST and MSI versions for manual
provisioning)
• Mac OS X client machine agent installation files
• AnyConnect agent installation files
• AV/AS compliance modules
Step 3 Click Download or Add to Cart.
Prerequisite:
If the default Update Feed URL is not reachable and your network requires a proxy server, you must
configure the proxy settings in Administration > System > Settings > Proxy before you access the Live
Update locations. If proxy settings are enabled to allow access to the profiler and posture/client
provisioning feeds, it will break access to the MDM server as Cisco ISE cannot bypass proxy services
for MDM communication. To resolve this, you can configure the proxy service to allow communication
to the MDM servers. For more information on proxy settings, see the “Specify Proxy Settings in Cisco
ISE” section in the “Administer Cisco ISE” chapter of the Cisco Identity Services Engine Administrator
Guide, Release 2.3.
For more information on automatically downloading the software packages that become available at
this portal to Cisco ISE, see the “Download Posture Updates Automatically” section in the
“Configure Client Posture Policies” chapter in the Cisco Identity Services Engine Administrator
Guide, Release 2.3.
If you do not want to enable the automatic download capabilities described above, you can choose to
download updates offline (see Cisco ISE Offline Updates, page 33).
For more information on adding the downloaded installation packages to Cisco ISE, refer to the “Add
Client Provisioning Resources from a Local Machine” section in the “Configure Client Provisioning”
chapter in the Cisco Identity Services Engine Administrator Guide, Release 2.3.
You can update the checks, operating system information, and antivirus and antispyware support charts
for Windows and Macintosh operating systems offline from an archive on your local system using
posture updates.
For offline updates, you need to ensure that the versions of the archive files match the version in the
configuration file. Use offline posture updates when you have configured Cisco ISE and want to enable
dynamic updates for the posture policy service.
Step 1 Go to https://www.cisco.com/web/secure/pmbu/posture-offline.html.
Save the posture-offline.zip file to your local system. This file is used to update the operating system
information, checks, rules, and antivirus and antispyware support charts for Windows and Macintosh
operating systems.
Step 2 Launch the Cisco ISE administrator user interface and choose Administration > System > Settings >
Posture.
Step 3 Click the arrow to view the settings for posture.
Step 4 Choose Updates.
The Posture Updates page appears.
Step 5 Choose the Offline option.
Step 6 Click Browse to locate the archive file (posture-offline.zip) from the local folder on your system.
Note The File to Update field is a required field. You can select only a single archive file (.zip) that
contains the appropriate files. Archive files other than .zip (like .tar, and .gz) are not allowed.
Step 1 Go to https://tools.cisco.com/bugsearch/search.
Step 2 Enter your registered Cisco.com username and password, and then click Log In.
The Bug Toolkit page opens.
Note If you do not have a Cisco.com username and password, you can register for them at
http://tools.cisco.com/RPF/register/register.do.
Step 3 To search for a specific bug, enter the bug ID in the Search For field and press Enter.
Step 4 To search for bugs in the current release:
a. Click the Select from List link.
The Select Product page is displayed.
b. Choose Security > Access Control and Policy > Cisco Identity Services Engine (ISE) 3300
Series Appliances.
c. Click OK.
d. When the search results are displayed, use the filter tools to find the types of bugs you are looking
for. You can search for bugs based on different criteria, such as status, severity, or modified date.
Click the Export Results to Excel link in the Search Results page to export all the bug details from your
search to an Excel spreadsheet. Presently, up to 10,000 bugs can be exported at a time to the Excel
spreadsheet.
Note Within the bug database, issues resolved in a patch have a version number with different nomenclature
in the format, “2.3(0.9NN)” where NN is also the patch number, displayed as two digits. For example,
version “2.3.0.298 patch 1" corresponds to the following version in the bug database “2.3(0.901)”.
Note We recommend you to clear your browser cache after you install a patch on Cisco ISE, Release 2.3.
Note We have recalled ISE 2.3 Patch 1 due to an issue we found after posting. An updated patch file has been
reposted, and the new file name is ise-patchbundle-2.3.0.298-Patch1-221754.SPA.x86_64.tar.gz. If you
already installed the previously posted patch, you MUST uninstall that patch, and install the new one.
Table 9 lists the issues that are resolved in Cisco Identity Services Engine, Release 2.3 cumulative
patch 1. To obtain the patch file necessary to apply the patch to Cisco ISE, Release 2.3, log in to the
Cisco Download Software site at http://www.cisco.com/cisco/software/navigator.html?a=a&i=rpm (you
might be required to provide your Cisco.com login credentials), navigate to Security > Access Control
and Policy > Cisco Identity Services Engine > Cisco Identity Services Engine Software, and save a copy
of the patch file to your local machine.
Patch 1 might not work with older versions of SPW. MAC users need to upgrade their SPW to
MacOsXSPWizard 2.1.0.42 or later and Windows users need to upgrade their SPW to WinSPWizard
2.1.0.51 or later.
Then refer to the “Installing a Software Patch” section of the “Administer Cisco ISE” chapter of the
Cisco Identity Services Engine Administrator Guide, Release 2.3. for instructions on how to apply the
patch to your system.
Caveat Description
CSCvd79546 Few Log Categories are not displayed in the Logging Categories page after upgrade.
Workaround Perform a full synchronization between the PPAN and SPAN before
upgrade.
CSCve82240 A comma is appended to the Sponsor's email address configured in the sponsor
portal.
Workaround Modify the email field manually and delete the comma.
CSCve84667 The Machine Access Restriction (MAR) cache distributed search is active despite
the node group being disabled for MAR cache distribution.
CSCve87511 Cisco ISE fails to support social login if the proxy server is configured.
CSCve99612 An error is reported in the Portal Settings and Customization page.
CSCvf22318 An ElasticSearch and database shards errors occur on the Endpoints Context
Visibility page.
CSCvf22676 Live logs do not occasionally show the actual authorization policy that is evaluated
when a policy is renamed.
CSCvf22827 LDAP Test Binding message does not include information about subjects, groups,
and response time.
CSCvf24580 RADIUS authentication report: RADIUS records are not filtered correctly with
“Today” and “Yesterday” options.
CSCvf24878 Unable to use different encryption keys when modifying scheduled backup.
CSCvf32212 Add a link to Social Login identity source in the Overview page of Guest Access
work center.
CSCvf33792 The guest flow diagram appears correctly on screens with lower resolution only
when the Portal Settings section is closed.
CSCvf34219 IPv6 TACACS+ authentication communicates only via port 49 in upgraded setup.
CSCvf34315 ISE 2.3 Guest Social login does not require AUP acceptance.
CSCvf36007 Allow Access only on these Days and Times option does not work for Social Login
flow after first login.
CSCvf36016 If Self-registration option is disabled and Social login with registration form option
is enabled, the registration form may not appear in the Portal Page Customization
tab.
CSCvf36031 Enhancements to social login for self-registered guests.
CSCvf37931 An overlap error occurs while editing network devices with multiple IPv6 addresses.
CSCvf41048 Policy sets do not reflect any changes made to the endpoint or user identity group
names.
CSCvf41249 Cannot fetch LDAP Groups and Attributes from UI unless issuing Test Binding
when Secure LDAP is configured using AD schema.
CSCvf42061 An “Exception: all shards failed” error is reported on the Endpoints Context
Visibility page.
Caveat Description
CSCvf42554 The Context Visibility tab occasionally fails to display the page when navigating
between tabs.
CSCvf44080 Prevent database corruption affecting order of policy sets or policy rules in a table.
CSCvf44272 ISE 2.2 Patch 2 core files should not be written to root partition.
Delete core files from the root directory.
CSCvf44549 In the Conditions Studio page, the scroll bar cannot be dragged to view the saved
conditions specified in a policy rule.
CSCvf44658 Policy Information Points (PIP) Identity Store returns incorrect attribute value after
AD is renamed.
CSCvf47157 Renamed identity stores are not reflected in referenced policies.
CSCvf47170 Policy processing occasionally fails to hit the correct policy set.
CSCvf47316 Fix for Entry Definition Framework (EDF) memory leak upon rollback.
CSCvf53116 The Upgrade Readiness Tool for upgrading from ISE 2.1/2.2 to 2.3 fails with the
ORA-32004: obsolete or deprecated parameter(s) error.
CSCvf55764 Few attribute validations fail in policy conditions.
CSCvf69018 Issue with reverse lookup when nodes are registered to Cisco ISE after applying ISE
2.2 Patch 1.
CSCvf75225 PAN runs high CPU due to 100K limit in the Redis server.
CSCvf87844 Filtering of endpoints in the Context Visibility page occasionally does not display
existing endpoints.
CSCvg19509 Log rotation of the syslog (/var/log/messages) fails occasionally and leads to /var
partition filing.
Caveat Description
CSCvf21215 If an extra interface is added to an ISE node on which Threat Centric NAC service is
enabled, the RabbitMQ service does not start when the services are restarted.
CSCvf02262 TLS messages are not included in ISE 2.3 Secure Communication Audit report.
CSCvf05516 Wireless LAN Controller (WLC) version 7.x and below does not redirect HTTPS
traffic during Facebook guest authentication.
CSCvf21586 Corrupted text seen in some of ISE Menus in Chrome browser.
CSCvf22676 Live logs are not showing the actual authorization policy that is evaluated when a
policy is renamed. (Resolved in ISE 2.3 Patch 1)
CSCvf28836 Irrelevant message displayed on AnyConnect agent when AnyConnect Temporal
agent starts system scan.
CSCvf29467 Results column is hidden in the Client Provisioning Policy page when multiple
policies are edited at the same time.
CSCvf32212 Add a link to Social Login identity source in the Overview page of Guest Access work
center. (Resolved in ISE 2.3 Patch 1)
CSCvf41249 Cannot fetch LDAP Groups and Attributes from UI unless issuing Test Binding when
Secure LDAP is configured using AD schema. (Resolved in ISE 2.3 Patch 1)
CSCvf22827 LDAP Test Binding message doesn't include information about subjects, groups, and
response time. (Resolved in ISE 2.3 Patch 1)
CSCvf32298 The counter displayed in the Sponsor portal Manage Accounts tab and the username
fields are not updated simultaneously when a self-registered user is created.
CSCvf32394 Global default SMS Service Provider option is always re-selected if the other
attributes are updated in the Self-registered guest portal.
CSCvf33475 When Configuration and Operational backup are taken at the same time from different
browsers, it takes too long time to complete.
CSCvf33792 The guest flow diagram is displayed properly on screens with smaller resolution only
when the Portal Settings section is closed. (Resolved in ISE 2.3 Patch 1)
CSCvf34219 IPv6 TACACS+ authentication is not working on any other port apart from port 49 in
upgraded setup. (Resolved in ISE 2.3 Patch 1)
CSCvf34315 ISE 2.3 Guest Social login does not require AUP acceptance.
CSCvf35162 Hostname/IP and port number details are not included in LDAP Test Bind message in
ISE 2.3
CSCvf36016 If Self-registration option is disabled and Social login with registration form option
is enabled, the registration form is missing in Portal Page Customization tab.
(Resolved in ISE 2.3 Patch 1)
CSCvf37416 When RADIUS authentication report is exported, RADIUS Status column in CSV file
shows 1 for passed authentications and 0 for failed authentications.
CSCvf34216 Not able to select Work Centers > Guest Access > Identity Groups option after
opening the Authentication Detail report from the Live Logs page.
CSCvf24037 File Name column in Backup and Restore table is not sorted correctly.
CSCvf10863 Guest reports does not include social media ID, user first/last name, and hyperlink to
cross launch Facebook.
Caveat Description
CSCvf36007 Allow Access only on these Days and Times option does not work for Social Login
flow after first login. (Resolved in ISE 2.3 Patch 1)
CSCvf31074 AD group name is not displayed in the TACACS+ detailed report.
CSCvf37338 AnyConnect temporal agent is not included in Policy elements > Results > Client
provisioning > Resources page after upgrading to ISE 2.3.
CSCvf33702 AccountCreate request fails with "401 Unauthorized" error if Authorization header is
specified.
CSCvf37763 Authorization policy is not correctly displayed in Live sessions/Live logs page after
COA.
CSCvf37931 Overlap error is thrown while editing a network device having more than one IPv6
address. (Resolved in ISE 2.3 Patch 1)
CSCvf39420 Adding a custom field to Sponsor portal throws error.
CSCvf32824 Offline status should be displayed in red with bold font for pxGrid services.
CSCvf22109 When you access the ISE GUI for the very first time, cursor is not displayed in the
ISE login username field in Chrome browser, if ISE certificate is not trusted.
Workaround
Caveat Description
CSCvd73072 The following error might occur in the Client Provisioning page while downloading
the Cisco Temporal Agent:
Your device does not comply with the network’s security guidelines and
has limited connectivity.
Workaround Clear the session in the WLC/ISE GUI to download the Cisco temporal
agent.
CSCvd38467 When iPhone is upgraded to 10.3.x, EAPTLS flow doesn’t work as per expected
behavior. Profile installation fails and displays the following error message:
Profile Installation Failed
The server certificate for
“https://<ISE-FQDN-or-IP>:<ISE-web-portal-port>/auth/OTAMobileConfig?..
.”
Note This only happens when you run unknown trusted certificates. It is
recommended to deploy well known certificates to your PSNs to prevent
installation failure.
Documentation Updates
Table 11 Updates to Release Notes for Cisco Identity Services Engine, Release 2.3
Date Description
10/19/2017 Added Resolved Issues in Cisco ISE Version 2.3.0.298—Cumulative Patch 1 and
Known Issues in Cisco ISE Version 2.3.0.298—Cumulative Patch 1.
Resolved Caveats
Table 12 Cisco ISE Release 2.3 Resolved Caveats
Caveat Description
CSCvc74300 /var/log/secure file size is increasing rapidly.
CSCvc74307 /var/cache/logwatch temp files are not removed.
CSCvc86247 High CPU usage caused by infinite loop threads on PSN.
CSCve73657 If the default condition in authentication inner policy is set to a value other than
DenyAccess, the default value gets reverted to DenyAccess after restart.
CSCvc83519 When an ISE node is rebooted, TC-NAC containers in the ISE node are not able to
communicate with Internet or other hosts.
CSCvc87853 SNMP process stops and restarts by itself after continuous snmpwalk queries.
CSCvd49843 Native Supplicant Profile with external CA/SCEP fails when ISE Internal CA is
disabled.
CSCvd61267 /var/log/messages log rotate does not work while creating new messages log file after
log rotation
CSCve51586 pxGrid stuck in initialization state if IP access restriction is configured.
CSCve77317 ISE 2.1 to 2.3 upgrade failed with “UPS upgrade handler failed” message.
CSCvf00883 pxGrid authorization denied and also takes 20 minutes to start working after primary
pxGrid node is down.
Related Documentation
Release-Specific Document
General product information for Cisco ISE is available at http://www.cisco.com/go/ise. End-user
documentation is available on Cisco.com at
http://www.cisco.com/en/US/products/ps11640/tsd_products_support_series_home.html.
Platform-Specific Documents
Links to other platform-specific documentation are available at the following locations:
• Cisco UCS C-Series Servers
http://www.cisco.com/en/US/docs/unified_computing/ucs/overview/guide/UCS
_rack_roadmap.html
This document is to be used in conjunction with the documents listed in the “Related Documentation” section.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of
Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The
use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any
examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only.
Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.