Cisco Cisco Identity Services Engine 1.2 Notas de publicación
132
Release Notes for Cisco Identity Services Engine, Release 1.2.x
OL-27043-01
Cisco ISE, Release 1.2.x, Open Caveats
Resolved Issues in Cisco ISE Version 1.2.0.899—Cumulative Patch 1
lists the issues that are resolved in Cisco Identity Services Engine, Release 1.2.0.899
cumulative patch 1.
To obtain the patch file necessary to apply the patch to Cisco ISE, Release 1.2, log into the Cisco
Download Software site at
Download Software site at
(you might
be required to provide your Cisco.com login credentials), navigate to Security > Access Control and
Policy > Cisco Identity Services Engine > Cisco Identity Services Engine Software, and save a copy
of the patch file to your local machine.
Policy > Cisco Identity Services Engine > Cisco Identity Services Engine Software, and save a copy
of the patch file to your local machine.
Then refer to the “
” section of the “Administering Cisco ISE” chapter of the
Cisco Identity Services Engine User Guide, Release 1.2. for instructions on how to apply the patch to
your system.
your system.
If you experience problems installing the patch, contact Cisco Technical Assistance Center.
Cisco ISE, Release 1.2.x, Open Caveats
•
•
Open Caveats
Table 38
Cisco ISE Patch Version 1.2.0.899-Patch 1 Resolved Caveats
Caveat
Description
CSCui16528
Wrong service selection for NDAC Policy
This fix addresses the issue in a Cisco ISE deployment with SGA functionality
implemented, where the authentication request was rejected by the Cisco ISE PSN
server and the request from the client timed out.
implemented, where the authentication request was rejected by the Cisco ISE PSN
server and the request from the client timed out.
Table 39
Cisco ISE, Release 1.2.x, Open Caveats
Caveat
Description
CSCua97013
Apple iOS devices are prompted to accept “Not Verified” certificates
Apple iOS devices (iPhone & iPad) are asked to accept the certificate, appearing to
them as “Not Verified,” when connecting to WLAN (802.1X).
them as “Not Verified,” when connecting to WLAN (802.1X).
By design, Apple iOS devices are prompted to accept a proprietary certificate, but
Apple OS X and Android devices work without being prompted to accept a
certificate.
Apple OS X and Android devices work without being prompted to accept a
certificate.
This happens even when the certificate is signed by a known CA, as there is an
intermediate certificate in the server certificate chain.
intermediate certificate in the server certificate chain.
Workaround
Click Accept to acknowledge the certificate. While browsing any URL,
the user is redirected to provision the device. After provisioning, the intermediate
certificate is installed on the iDevice.
certificate is installed on the iDevice.