<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Supported Ciphers for ISE repository in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/3767089#M517419</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt; and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/354117"&gt;rob.alvarado@live.com&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My customer ran into this same issue.&amp;nbsp; Their SFTP server is a Microsoft box running OpenSSH.&amp;nbsp; I was able to reproduce this in the lab using the Windows 10 SFTP implementation (which now come free with Windows 10)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Incidentally, I have never seen this issue with Linux based SSHD implementations (because I assume they leave a lot of the legacy ciphers enabled).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tested this in my lab and the only change I made to my Windows OpenSSH sshd_config file was to add the line below – it leaves the other ciphers in place and only ADDs one more (for ISE)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ciphers +aes256-cbc&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did enable the debugging command too&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;LogLevel DEBUG&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because this was a fresh install, I didn’t change any other lines of the config file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By the way, I found two config files in two different locations!&amp;nbsp;&amp;nbsp; Don’t be fooled – the one that the Windows Service uses (in my case) was here&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;C:\ProgramData\ssh\sshd_config&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And you should be able to view the log (very useful when combined with the DEBUG level enabled)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;C:\ProgramData\ssh\logs\sshd.log&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-SPOILER&gt;When is this going to be fixed in ISE??&lt;/LI-SPOILER&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Dec 2018 04:00:57 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2018-12-20T04:00:57Z</dc:date>
    <item>
      <title>Supported Ciphers for ISE repository</title>
      <link>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/3488435#M517417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Guys and Gals,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question in regards to supported ISE Ciphers...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To make a long story short we are unable to save to our repository since we migrated over to our new Toolbox Server. The TAC engineer stated that ciphers were at fault here so we are asking if ISE supports the following ciphers: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srmcucsisepanad01/admin# ssh 10.32.3.11 NetOpsFTP Unable to negotiate with 10.32.3.11 port 22: no matching cipher found. Their offer: &lt;STRONG&gt;aes128-ctr,aes192-ctr,aes256-ctr&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way we can add these ciphers to ISE? If not can we have a list of ciphers that are supported so we can adjust on our end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;-Robert &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2018 19:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/3488435#M517417</guid>
      <dc:creator>rob.alvarado@live.com</dc:creator>
      <dc:date>2018-03-06T19:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: Supported Ciphers for ISE repository</title>
      <link>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/3488436#M517418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe you are hitting this known issue -- &lt;SPAN style="color: #000000; font-family: Calibri, sans-serif; font-size: 14.666666984558105px;"&gt;CSCum13116&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please work with Cisco TAC and see if it helps by adding the ciphers in ISE temporarily.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2018 20:39:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/3488436#M517418</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-03-06T20:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: Supported Ciphers for ISE repository</title>
      <link>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/3767089#M517419</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt; and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/354117"&gt;rob.alvarado@live.com&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My customer ran into this same issue.&amp;nbsp; Their SFTP server is a Microsoft box running OpenSSH.&amp;nbsp; I was able to reproduce this in the lab using the Windows 10 SFTP implementation (which now come free with Windows 10)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Incidentally, I have never seen this issue with Linux based SSHD implementations (because I assume they leave a lot of the legacy ciphers enabled).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tested this in my lab and the only change I made to my Windows OpenSSH sshd_config file was to add the line below – it leaves the other ciphers in place and only ADDs one more (for ISE)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ciphers +aes256-cbc&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did enable the debugging command too&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;LogLevel DEBUG&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because this was a fresh install, I didn’t change any other lines of the config file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By the way, I found two config files in two different locations!&amp;nbsp;&amp;nbsp; Don’t be fooled – the one that the Windows Service uses (in my case) was here&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;C:\ProgramData\ssh\sshd_config&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And you should be able to view the log (very useful when combined with the DEBUG level enabled)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;C:\ProgramData\ssh\logs\sshd.log&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-SPOILER&gt;When is this going to be fixed in ISE??&lt;/LI-SPOILER&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Dec 2018 04:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/3767089#M517419</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-12-20T04:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: Supported Ciphers for ISE repository</title>
      <link>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/3767303#M517420</link>
      <description>aes-256-cbc, aes-128-cbc are for sure supported. Rest other ciphers change from version to version. To answer your question whether or not you can specify what cipher to use on the ISE, you cannot. &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt; has already provided the bug id filed for this issue.</description>
      <pubDate>Thu, 20 Dec 2018 13:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/3767303#M517420</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-20T13:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: Supported Ciphers for ISE repository</title>
      <link>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/4457953#M569395</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Just wanted to share how I resolved the issue with the help from Cisco TAC.&lt;/P&gt;&lt;P&gt;First of all, SFTP works like SSH using port 22. If SFTP does not work, ssh will not work either.&lt;/P&gt;&lt;P&gt;Accidentally I found my secondary node had no issue with ssh. That prompt me to what the difference of ssh settings between between these two nodes, I found the only difference is the following line is missing on the ssh_config on the primary node.&lt;/P&gt;&lt;P&gt;#&amp;nbsp;&amp;nbsp; Ciphers aes127-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Ciphers aes128-ctr,aes192-ctr,aes256-ctr&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;After adding the above line, saving the file, restarting the sshd service, ssh started to work, and SFTP also works from then.&lt;/P&gt;&lt;P&gt;To change the ssh_config file, you will need Cisco TAC's help to install two special patches to allow you to get into root access.&lt;/P&gt;&lt;P&gt;If you have already enabled root access, then do the the following steps:&lt;/P&gt;&lt;P&gt;1. Cisco-ISE-ABC#&lt;STRONG&gt;root&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; type the password you set up when enabling root access,&lt;/P&gt;&lt;P&gt;2. ade#&lt;STRONG&gt;cd /etc/ssh&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;vi ssh_config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;3. add the line below to the file right under line 41 without #. I guess this can be anywhere around that area as they are all commented.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;Ciphers aes128-ctr,aes192-ctr,aes256-ctr&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;4. Save the change and restart the sshd service with the command below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;systemctl restart sshd&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Test your ssh access and sftp, you will be happy again.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 03:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/supported-ciphers-for-ise-repository/m-p/4457953#M569395</guid>
      <dc:creator>ElishaHuang48437</dc:creator>
      <dc:date>2021-09-01T03:45:21Z</dc:date>
    </item>
  </channel>
</rss>

