Cisco Cisco Identity Services Engine 1.2 Notas de publicación

Descargar
Página de 186
 
132
Release Notes for Cisco Identity Services Engine, Release 1.2.x
OL-27043-01
  Cisco ISE, Release 1.2.x, Open Caveats
Resolved Issues in Cisco ISE Version 1.2.0.899—Cumulative Patch 1
 lists the issues that are resolved in Cisco Identity Services Engine, Release 1.2.0.899 
cumulative patch 1. 
To obtain the patch file necessary to apply the patch to Cisco ISE, Release 1.2, log into the Cisco 
Download Software site at 
 (you might 
be required to provide your Cisco.com login credentials), navigate to Security > Access Control and 
Policy > Cisco Identity Services Engine > Cisco Identity Services Engine Software
, and save a copy 
of the patch file to your local machine.
Then refer to the “
” section of the “Administering Cisco ISE” chapter of the 
Cisco Identity Services Engine User Guide, Release 1.2. for instructions on how to apply the patch to 
your system.
If you experience problems installing the patch, contact Cisco Technical Assistance Center.
Cisco ISE, Release 1.2.x, Open Caveats
Open Caveats
Table 38
Cisco ISE Patch Version 1.2.0.899-Patch 1 Resolved Caveats
Caveat
Description
CSCui16528
Wrong service selection for NDAC Policy
This fix addresses the issue in a Cisco ISE deployment with SGA functionality 
implemented, where the authentication request was rejected by the Cisco ISE PSN 
server and the request from the client timed out.
Table 39
Cisco ISE, Release 1.2.x, Open Caveats
Caveat
Description
CSCua97013
Apple iOS devices are prompted to accept “Not Verified” certificates
Apple iOS devices (iPhone & iPad) are asked to accept the certificate, appearing to 
them as “Not Verified,” when connecting to WLAN (802.1X).
By design, Apple iOS devices are prompted to accept a proprietary certificate, but 
Apple OS X and Android devices work without being prompted to accept a 
certificate.
This happens even when the certificate is signed by a known CA, as there is an 
intermediate certificate in the server certificate chain.
Workaround
Click Accept to acknowledge the certificate. While browsing any URL, 
the user is redirected to provision the device. After provisioning, the intermediate 
certificate is installed on the iDevice.