<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: File transfer using HTTPS and SCP failed in Cisco Catalyst Center</title>
    <link>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/3892897#M1102</link>
    <description>&lt;P&gt;what's the DNA center version , Also can you check if the DNA Center certificate is been installed on Network device on which you are trying installation "show running | sec crypto"&lt;/P&gt;</description>
    <pubDate>Thu, 18 Jul 2019 15:29:00 GMT</pubDate>
    <dc:creator>Pavan Siripuram</dc:creator>
    <dc:date>2019-07-18T15:29:00Z</dc:date>
    <item>
      <title>File transfer using HTTPS and SCP failed</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/3886230#M1083</link>
      <description>&lt;P&gt;Hi all!&lt;/P&gt;&lt;P&gt;Trying to update switches OS from DNA UI and receiving this pre-check error:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;File transfer using HTTPS and SCP failed&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Expected : Device need to have https/scp reachability to Controller&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Action : Verify HTTPS/SCP configurations, DNAC certificates on device and protocol reachability&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is switch config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa new-model&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;aaa authentication login default local&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;aaa authorization exec default local&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;hostname DNA-SW-01&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip domain name test.ru&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip http secure-server&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip ssh version 2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip scp server enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Vlan1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address 172.23.84.114 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DNA ip address is&amp;nbsp;172.23.84.110. There is no security devices between them.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can ping switch from DNA CLI, transfer files manually and ssh to switch from DNA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;$ ping 172.23.84.114&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;PING 172.23.84.114 (172.23.84.114) 56(84) bytes of data.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;64 bytes from 172.23.84.114: icmp_seq=1 ttl=254 time=0.544 ms&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;64 bytes from 172.23.84.114: icmp_seq=2 ttl=254 time=0.437 ms&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;64 bytes from 172.23.84.114: icmp_seq=3 ttl=254 time=0.456 ms&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;64 bytes from 172.23.84.114: icmp_seq=4 ttl=254 time=0.475 ms&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;^C&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;--- 172.23.84.114 ping statistics ---&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;4 packets transmitted, 4 received, 0% packet loss, time 3000ms&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;rtt min/avg/max/mdev = 0.437/0.478/0.544/0.040 ms&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;$ ssh admin@172.23.84.114&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Password:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;DNA-SW-01#quit&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Connection to 172.23.84.114 closed by remote host&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;$ scp ld-linux-x86-64.so.2 admin@172.23.84.114:ld-linux-x86-64.so.2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;The authenticity of host '172.23.84.114 (172.23.84.114)' can't be established.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;RSA key fingerprint is SHA256:0Va4kQYFYOMmAYiNW89T9Z86llDvXGaLmS9FA8mo69g.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Are you sure you want to continue connecting (yes/no)? yes&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Warning: Permanently added '172.23.84.114' (RSA) to the list of known hosts.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Password:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ld-linux-x86-64.so.2 100% 159KB 158.8KB/s 00:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Connection to 172.23.84.114 closed by remote host.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to fix update error in DNA UI?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 11:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/3886230#M1083</guid>
      <dc:creator>Sergey Sakharov</dc:creator>
      <dc:date>2019-07-08T11:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: File transfer using HTTPS and SCP failed</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/3892897#M1102</link>
      <description>&lt;P&gt;what's the DNA center version , Also can you check if the DNA Center certificate is been installed on Network device on which you are trying installation "show running | sec crypto"&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 15:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/3892897#M1102</guid>
      <dc:creator>Pavan Siripuram</dc:creator>
      <dc:date>2019-07-18T15:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: File transfer using HTTPS and SCP failed</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/3893362#M1106</link>
      <description>&lt;P&gt;DNAC&amp;nbsp;&lt;SPAN&gt;Version 1.2.8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Command output from switch&amp;nbsp;below&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto pki certificate chain DNAC-CA&lt;BR /&gt;certificate ca 00E99FCCE66D61F2AA&lt;BR /&gt;308202F7 308201DF A0030201 02020900 E99FCCE6 6D61F2AA 300D0609 2A864886 ....&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's quite strange but after two days it started to work. With no changes at all.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2019 07:12:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/3893362#M1106</guid>
      <dc:creator>Sergey Sakharov</dc:creator>
      <dc:date>2019-07-19T07:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: File transfer using HTTPS and SCP failed</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/4308363#M3243</link>
      <description>&lt;P&gt;Just want to help anyone out that was going through this as well. I spent several hours trying to solve this and I think I finally got it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. All of my devices either failed HTTPS and succeeded on SCP, or failed both. I couldn't understand why SCP worked on some switches but not others. The answer was the&amp;nbsp;&lt;STRONG&gt;ip ssh version 2&lt;/STRONG&gt; was configured on the switches that worked. I added this to the switches that were failing over SCP and they started working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So now I could actually deploy the images and upgrade them. The problem was then that SCP was painfully slow. So I ended up getting HTTPS to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. For HTTPS to succeed the switches need to have the cert of DNAC installed locally. The easiest way to do this is to obtain the PEM file from DNAC itself&amp;nbsp;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=http-3A__-253Cdnac-253E_ca_pem&amp;amp;d=DwQFAg&amp;amp;c=eX9KRkvDm-KpLMQpCehyR8jZgBp9CE2JNMo9X4BhLFU&amp;amp;r=DhX2Gk_kMxggoZ1dZWWom3JshNT4UoSwgpsSCikk_lU&amp;amp;m=xP8IOeqyHWDHqPIM0Ad7mrP9nQRhSCYLBBLY1I4AHPA&amp;amp;s=qjcCbqBZKs8keFWliSF9wmtvxOFaHS9EfAfG45miVUI&amp;amp;e=" target="_blank" rel="noopener"&gt;http://&amp;lt;dnac&amp;gt;/ca/pem&lt;/A&gt;&amp;nbsp;then open it in notepad.&lt;/P&gt;&lt;P&gt;Now login to the switch and remove the DNAC-CA as a trustpoint if it already exists (for some reason I had a DNAC-CA cert on some of my switches but apparently it was not the correct cert)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;STRONG&gt;no crypto pki trustpoint DNAC-CA&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now re-configure the trustpoint:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto pki trustpoint DNAC-CA &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;enrollment mode ra&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;enrollment terminal&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;usage ssl-client&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;revocation-check none&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;exit&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now add in the certficate:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto pki authenticate DNAC-CA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;*paste in the cert from the PEM file that you have open in notepad*&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At this point you should be able to successfully reach the DNAC over its IP, you can test it out with this command:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;copy https://&amp;lt;dnac-ip&amp;gt;//core/img/cisco-bridge.png flash:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now when you do an image readiness check, you should see HTTPS succeeding. In my case, using HTTPS resulted in a 10 minute transfer, while SCP was 47 minutes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notes:&lt;/P&gt;&lt;P&gt;You do&amp;nbsp;&lt;EM&gt;not&lt;/EM&gt; need to enable HTTPS or SCP server on the switch itself. The switch is not running the server, it is acting as the client in the HTTPS or SCP file transfer&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 18:32:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/4308363#M3243</guid>
      <dc:creator>andrewohanian</dc:creator>
      <dc:date>2021-03-16T18:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: File transfer using HTTPS and SCP failed</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/4308522#M3244</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/618627"&gt;@andrewohanian&lt;/a&gt;&amp;nbsp;When Cisco DNA is managing a device, you will benefit from not having to reconfigure things on the device console on your own. &amp;nbsp;It is often automated for you. &amp;nbsp;When it comes to certificates, a new certificate will be pushed to all network devices when it's updated in the Cisco DNA settings. &amp;nbsp;If for some reason that doesn't work, you can also try provisioning the device or updating telemetry settings. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A bad certificate is the most common reason for HTTPs SWIM upgrades to fail.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 22:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/4308522#M3244</guid>
      <dc:creator>Preston Chilcote</dc:creator>
      <dc:date>2021-03-16T22:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: File transfer using HTTPS and SCP failed</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/4568944#M5039</link>
      <description>&lt;P&gt;What fixed the same issue for me was simply adding a DNS server to the switches config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Commands were:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;conf t&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip name-server &amp;lt;IP address of our DNS server 1&amp;gt;&amp;nbsp;&amp;lt;IP address our DNS server 2&amp;gt;&amp;nbsp;&amp;lt;IP address of our DNS server 3&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;do wr&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;end&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;I hope this helps someone out there.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.linkedin.com/in/sallaoua/" target="_self"&gt;Seif Allaoua | LinkedIn&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 16:38:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/4568944#M5039</guid>
      <dc:creator>Seifou90</dc:creator>
      <dc:date>2022-03-11T16:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: File transfer using HTTPS and SCP failed</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/4719749#M6129</link>
      <description>&lt;P&gt;I found the issue was with CRL checking on the DNAC trustpoint.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After manually applying this config update Http copy worked:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;crypto pki trustpoint DNAC-CA&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;revocation-check none&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;I'm using DNAC 2.2.2.9 .... hopefully this is fixed in a later version... in the meantime I'll update the provisioning template we use on all devices to automate this.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 10:51:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/4719749#M6129</guid>
      <dc:creator>ATKS</dc:creator>
      <dc:date>2022-11-11T10:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: File transfer using HTTPS and SCP failed</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/4719874#M6132</link>
      <description>&lt;P&gt;Just an FYI:&lt;/P&gt;
&lt;P&gt;Design / Network Settings / Security and Trust&lt;/P&gt;
&lt;P&gt;** New feature added in Cisco DNA Center version 2.3.4.x &amp;amp; later&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Design_NetworkSettings--Security-Trust.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/167696i481497FC1C09928E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Design_NetworkSettings--Security-Trust.png" alt="Design_NetworkSettings--Security-Trust.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 15:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/4719874#M6132</guid>
      <dc:creator>Tomas de Leon</dc:creator>
      <dc:date>2022-11-11T15:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: File transfer using HTTPS and SCP failed</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/5257575#M11744</link>
      <description>&lt;P&gt;I tried all the steps above, but my solution was different.&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;U&gt;Working&lt;/U&gt;&lt;/P&gt;&lt;P&gt;ip name-server &lt;EM&gt;DNS1 DNS2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip domain lookup&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip domain lookup source-interface Vlan&lt;EM&gt;##&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;ip domain name &lt;EM&gt;domain-name&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;U&gt;Not working&lt;/U&gt;&lt;/P&gt;&lt;P&gt;ip name-server &lt;EM&gt;DNS1 DNS2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;ip domain lookup source-interface Vlan##&lt;/P&gt;&lt;P&gt;ip domain name &lt;EM&gt;domain-name&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;I added the &lt;STRONG&gt;'no ip domain lookup'&lt;/STRONG&gt; command to the non-working devices, then re-ran &lt;STRONG&gt;'Update Telemetry Settings' -&amp;gt; 'Force Configuration Push,'&lt;/STRONG&gt; and performed a &lt;STRONG&gt;'Re-Execute Checks.'&lt;/STRONG&gt; This time, the &lt;STRONG&gt;File Transfer Check&lt;/STRONG&gt; passed.&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2025 14:35:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/file-transfer-using-https-and-scp-failed/m-p/5257575#M11744</guid>
      <dc:creator>jose-gonzalez</dc:creator>
      <dc:date>2025-02-06T14:35:30Z</dc:date>
    </item>
  </channel>
</rss>

