<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SXP between ASA and ISE fails in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4445644#M568892</link>
    <description>&lt;P&gt;You don't show it but I'm assuming ISE is already set up with two SXP speaker connections for the ASA and the persona/role is enabled on both ISE nodes?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The log message you shared indicated the ASA is not able to reach ISE from the source IP cannot be reached from source ip 10.1.20.100 (routing) or the traffic is not getting back to the ASA IP&amp;nbsp;cannot be reached from source ip 10.1.20.100 (ACL/FW policy). If you do a packet tracer on the CLI or ASDM specifying source&amp;nbsp;cannot be reached from source ip 10.1.20.100, destination&amp;nbsp;&lt;SPAN&gt;10.3.5.52 TCP 64999, does it get dropped?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You can also tcpdump 10.3.5.52 with the filter "ip host 10.1.20.100" from the PAN GUI, should show you if the SXP connection reachability is ok.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Aug 2021 18:54:43 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2021-08-06T18:54:43Z</dc:date>
    <item>
      <title>SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4445637#M568891</link>
      <description>&lt;P&gt;Guys&lt;/P&gt;&lt;P&gt;i need advice with subject. ASA runs 9.12.4(10), ISE is 2.1 latest patch&lt;/P&gt;&lt;P&gt;things before SXP setup:&lt;/P&gt;&lt;P&gt;1) ASA was configured for CTS&amp;nbsp; &amp;amp; it was prepared on the ISE as NAD. ASA has been successfully able to fetch SGT from ISE. config on ASA:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;aaa-server ISE protocol radius&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;dynamic-authorization&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;aaa-server NewSite_ISE protocol radius&lt;BR /&gt;dynamic-authorization&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;!below node is PAN ; actually only PAN in this setup was needed because of some circumstances&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;aaa-server NewSite_ISE (inside) host 10.3.5.50&lt;BR /&gt;key *****&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;!below node is PSN1&lt;BR /&gt;aaa-server NewSite_ISE (inside) host 10.3.5.52&lt;BR /&gt;key *****&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;!below node is PSN2&lt;BR /&gt;aaa-server NeewSite_ISE (inside) host 10.4.5.52&lt;BR /&gt;key *****&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;cts server-group ISE&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;2) config on ASA was rolled back because of need to do all stuff from CSM (4.19 ; and ISE integration with it only possible starting from 2.3 version).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SXP setup done from CSM (only ISE server group is defined under TrustSec/SXP Settings and SXP itself obviously) :&lt;/P&gt;&lt;P&gt;1) after deployment on ASA&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;aaa-server NewSite_ISE protocol radius&lt;BR /&gt;dynamic-authorization&lt;BR /&gt;aaa-server NewSite_ISE (inside) host 10.3.5.50&lt;BR /&gt;key *****&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;BR /&gt;aaa-server NewSite_ISE (inside) host 10.3.5.52&lt;BR /&gt;key *****&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;BR /&gt;aaa-server NewSite_ISE (inside) host 10.4.5.52&lt;BR /&gt;key *****&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;BR /&gt;cts server-group NewSite_ISE&lt;BR /&gt;cts sxp enable&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;amp; this is where **bleep** started to happen - connection on ISE shown as pending ;&amp;nbsp; on ASA no CTS SXP connections shown as pending&amp;nbsp;and password is not set. Ok. adding default password in TrustSec / SXP Connection Peers but w/o any effect.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;cts sxp default password *****&lt;/P&gt;&lt;P&gt;Ok. adding PSNs as peers as noticed in ASA's events monitoring (2nd PSN is talking to ASA on TCP/64999 but no actual evidences ASA is trying to talk to ISE:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;cts sxp connection peer 10.4.5.52 source 10.1.20.100 password default mode local listener&lt;BR /&gt;cts sxp connection peer 10.3.5.52 source 10.1.20.100 password default mode local listener&lt;/P&gt;&lt;P&gt;turning on debug cts sxp all. result (needless to say traffic was very initially permitted with ACLs on ASA):&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;[cts sxp conn error]: sxp_eval_src_ip: Peer address 10.3.5.52 cannot be reached from source ip 10.1.20.100&lt;BR /&gt;[cts sxp conn error]: sxp_listen_sock_may_init: invalid vpifnum: 10.1.20.100&lt;BR /&gt;[cts sxp conn error]: sxp_eval_src_ip: Peer address 10.3.5.52 cannot be reached from source ip 10.1.20.100&lt;BR /&gt;[cts sxp conn error]: sh_create_conn: SXP Socket Open failed, conn index = 1&lt;BR /&gt;[cts sxp conn error]: cts_sxp_cfg_setup_conn: Conn request failed; ip_addr = 10.3.5.52&lt;BR /&gt;[cts sxp conn error]: sxp_eval_src_ip: Peer address 10.4.5.52 cannot be reached from source ip 10.1.20.100&lt;BR /&gt;[cts sxp conn error]: sxp_listen_sock_may_init: invalid vpifnum: 10.1.20.100&lt;BR /&gt;[cts sxp conn error]: sxp_eval_src_ip: Peer address 10.4.5.52 cannot be reached from source ip 10.1.20.100&lt;BR /&gt;[cts sxp conn error]: sh_create_conn: SXP Socket Open failed, conn index = 2&lt;BR /&gt;[cts sxp conn error]: cts_sxp_cfg_setup_conn: Conn request failed; ip_addr = 10.4.5.52&lt;BR /&gt;[cts sxp conn error]: sxp_eval_src_ip: Peer address 10.3.5.52 cannot be reached from source ip 10.1.20.100&lt;BR /&gt;[cts sxp conn error]: sxp_eval_src_ip: Peer address 10.4.5.52 cannot be reached from source ip 10.1.20.100&lt;BR /&gt;[cts sxp conn error]: sxp_eval_src_ip: Peer address 10.3.5.52 cannot be reached from source ip 10.1.20.100&lt;BR /&gt;[cts sxp conn error]: sxp_eval_src_ip: Peer address 10.4.5.52 cannot be reached from source ip 10.1.20.100&lt;BR /&gt;[cts sxp conn error]: sxp_eval_src_ip: Peer address 10.3.5.52 cannot be reached from source ip 10.1.20.100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 18:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4445637#M568891</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-08-06T18:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4445644#M568892</link>
      <description>&lt;P&gt;You don't show it but I'm assuming ISE is already set up with two SXP speaker connections for the ASA and the persona/role is enabled on both ISE nodes?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The log message you shared indicated the ASA is not able to reach ISE from the source IP cannot be reached from source ip 10.1.20.100 (routing) or the traffic is not getting back to the ASA IP&amp;nbsp;cannot be reached from source ip 10.1.20.100 (ACL/FW policy). If you do a packet tracer on the CLI or ASDM specifying source&amp;nbsp;cannot be reached from source ip 10.1.20.100, destination&amp;nbsp;&lt;SPAN&gt;10.3.5.52 TCP 64999, does it get dropped?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You can also tcpdump 10.3.5.52 with the filter "ip host 10.1.20.100" from the PAN GUI, should show you if the SXP connection reachability is ok.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 18:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4445644#M568892</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2021-08-06T18:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4445652#M568893</link>
      <description>&lt;P&gt;Hi Damien&lt;/P&gt;&lt;P&gt;in fact there is a rule allowing to communicate ASA IP 10.1.20.100 with ISE's nodes. But it's quite strange that packet-tracer fails TCP with src of active ASA (10.1.20.100) to any external IP (actually ISE is just behind L2L tunnel). In fact none of allowed by ACLs TCP/64999 to ISE's IP is successful if it's originated from Active ASA's IP within packet-tracer. It's successful from other IPs of subnets in encryption domain. it's successful from standby ASA's IP but not from active. Next action for me is to take tcpdump from relevant ISE's nodes. But i have a feeling it wont change much.&lt;/P&gt;&lt;P&gt;UPD:&lt;/P&gt;&lt;P&gt;tcpdump on PSN shows SYN &amp;amp; its retransmits to ASA's IP.&lt;/P&gt;&lt;P&gt;with capture on ASA i cannot catch traffic of interest except of permitted TCP/64999 from PSN but attempts in opposite direction&lt;/P&gt;&lt;P&gt;and with "show asp table socket" i cannot see ASA listening on TCP/64999.&lt;/P&gt;&lt;P&gt;10.1.20.100 is inside interface&amp;nbsp;&lt;/P&gt;&lt;P&gt;UPD: ASA reconfigured with below delta w/o improvement&lt;/P&gt;&lt;P&gt;cts sxp default source-ip 10.1.20.100&lt;BR /&gt;cts sxp connection peer 10.4.5.52 password default mode local listener&lt;BR /&gt;cts sxp connection peer 10.3.5.52 password default mode local listener&lt;/P&gt;</description>
      <pubDate>Sun, 08 Aug 2021 18:26:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4445652#M568893</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-08-08T18:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4449538#M569044</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;with "show asp table socket" i cannot see ASA listening on TCP/64999.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is SXP enabled in ASA? If so, try disabling it ("no cts sxp enable") and then re-enabling it ("cts sxp enable"). If that does not do it, then please engage TAC to troubleshoot on the ASA.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Aug 2021 20:35:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4449538#M569044</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2021-08-14T20:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4449580#M569052</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;sxp was obviously enabled. disabling/reenabling didnt help (&lt;/P&gt;&lt;P&gt;will call TAC by chance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Aug 2021 06:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4449580#M569052</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-08-15T06:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4449782#M569054</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;have you tried adding the following to your ASA to permit SSH from ISE:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;ssh &amp;lt;ISE IP&amp;gt; inside&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ran into issues with ISE/ASA/SXP on an old 5500 and found the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Some platforms do not support Cisco ISE's "Push" feature for Change of Authorization (CoA), for example: some versions of the Nexus network device. For this case, ISE will connect to the network device and make it to trigger an updated configuration request towards ISE. To achieve this, ISE opens an SSHv2 tunnel to the network device, and the Cisco ISE sends a command that triggers a refresh of the TrustSec policy matrix."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010111.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010111.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 06:37:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4449782#M569054</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2021-08-16T06:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4450097#M569061</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;will try by case but i'm not sure how switching from CoA to SSH on ISE in Adv TrustSec settings can make enforce ASA to listen on SXP port or rectify it from failure to initiate SXP session toward ISE.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 19:02:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4450097#M569061</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-08-16T19:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4453430#M569214</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;i've configured ASA's admin creds under Device Configuration Deployment but ISE reports failure:&lt;/P&gt;&lt;P&gt;ERROR: ASA-IP(10.1.20.100) : Could not connect: Device not reachable&lt;/P&gt;&lt;P&gt;Though with tcpdump on ISE i can see the ASA resets session at once after last ACK:&lt;/P&gt;&lt;P&gt;1 2021-08-23 11:14:27.923167 10.3.5.50 10.1.20.100 TCP 74 61858 → 22 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 SACK_PERM=1 TSval=1593744651 TSecr=0 WS=128&lt;BR /&gt;2 2021-08-23 11:14:27.949282 10.1.20.100 10.3.5.50 TCP 60 22 → 61858 [SYN, ACK] Seq=0 Ack=1 Win=8192 Len=0 MSS=1360&lt;BR /&gt;3 2021-08-23 11:14:27.949303 10.3.5.50 10.1.20.100 TCP 54 61858 → 22 [ACK] Seq=1 Ack=1 Win=29200 Len=0&lt;BR /&gt;4 2021-08-23 11:14:27.949394 10.3.5.50 10.1.20.100 SSHv2 74 Client: Protocol (SSH-2.0-JSCH-0.1.51)&lt;BR /&gt;5 2021-08-23 11:14:27.975282 10.1.20.100 10.3.5.50 TCP 60 22 → 61858 [ACK] Seq=1 Ack=21 Win=32768 Len=0&lt;BR /&gt;6 2021-08-23 11:14:27.975331 10.1.20.100 10.3.5.50 TCP 60 22 → 61858 [RST] Seq=1 Win=32768 Len=0&lt;/P&gt;</description>
      <pubDate>Mon, 23 Aug 2021 09:29:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4453430#M569214</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-08-23T09:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4453893#M569228</link>
      <description>&lt;P&gt;Is ISE IP allowed to SSH to this ASA?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 02:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4453893#M569228</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2021-08-24T02:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4453939#M569229</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;TCP handshake passes :0)&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 06:13:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4453939#M569229</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-08-24T06:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4454053#M569230</link>
      <description>&lt;P&gt;Obvious to say but this looks to be a pure routing/access issue between ISE and the ASA, not particularly related to features like SXP. If you log into the ISE CLI you should be able to SSH to the ASA: 'admin# ssh &amp;lt;ASA IP&amp;gt; &amp;lt;username&amp;gt;'. You may be prompted asking if you're sure, if there are perhaps V1/V2 discrepancies with RSA key fingerprint for example, but if routing is good then answering that you're sure should let you in. If you do have an interaction with answering yes or no then ISE itself wouldn't handle that which may be the reason that adding IP:SGT mappings via SSH may not work. If there's no interaction then you should be able to add mappings via ISE using SSH although I agree with the comments above that has no bearing on why SXP isn't coming up. I would double check the access rules and statements similar to 'access-group outside_access_in in interface outside' to check if the right suitable policies are in place.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 10:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4454053#M569230</guid>
      <dc:creator>jeaves@cisco.com</dc:creator>
      <dc:date>2021-08-24T10:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4454070#M569231</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;of course it has nothing to do with SXP topic but it's just next penny to ASA-ISE integration problems :0)&lt;/P&gt;&lt;P&gt;i dont think it's either interaction or (especially) routing problem.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i do SSH from ISE i receive reset immediately:&amp;nbsp;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;ISE/admin# ssh 10.1.20.100 admin version 2&lt;BR /&gt;ssh_exchange_identification: read: Connection reset by peer&lt;BR /&gt;ISE/admin#&lt;/P&gt;&lt;P&gt;In parallel tcp dump on ISE caught below about above session (FW sends RST after ISE presents its client version)&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;1 2021-08-24 12:48:52.144757 10.3.5.50 10.1.20.100 TCP 74 19744 → 22 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 SACK_PERM=1 TSval=1685808872 TSecr=0 WS=128&lt;BR /&gt;2 2021-08-24 12:48:52.171040 10.1.20.100 10.3.5.50 TCP 60 22 → 19744 [SYN, ACK] Seq=0 Ack=1 Win=8192 Len=0 MSS=1360&lt;BR /&gt;3 2021-08-24 12:48:52.171087 10.3.5.50 10.1.20.100 TCP 54 19744 → 22 [ACK] Seq=1 Ack=1 Win=29200 Len=0&lt;BR /&gt;4 2021-08-24 12:48:52.171359 10.3.5.50 10.1.20.100 SSHv2 75 Client: Protocol (SSH-2.0-OpenSSH_6.6)&lt;BR /&gt;5 2021-08-24 12:48:52.197532 10.1.20.100 10.3.5.50 TCP 60 22 → 19744 [RST] Seq=1 Win=32768 Len=0&lt;/P&gt;&lt;P&gt;In another one parallel CSM event viewer registers flow on exactly target FWs (FWHQ on the ISE side &amp;amp; FWNEWSITE)&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Receive Time Severity Event Type ID Event Name Device Source Source User Identity Source Service Destination Destination FQDN Destination Service Direction Protocol Action Connection ID Policy Map Class Map ACL Name Description Event ID&lt;BR /&gt;8/24/21 12:43:51 PM Error 302014 Teardown TCP FWNEWSITE 10.3.5.50 tcp/19164 FWNEWSITE_10.1.20.100 tcp/22 tcp teardown 9010803 Teardown tcp connection 9010803 for Outside.1010:10.3.5.50/19164 to identity:10.1.20.100/22 duration 0:00:00 bytes 0 TCP Reset by appliance 543563431472&lt;BR /&gt;8/24/21 12:43:51 PM Error 302014 Teardown TCP FW-HQ 10.3.5.50 tcp/19164 FWNEWSITE_10.1.20.100 tcp/22 tcp teardown 2765751720 Teardown tcp connection 2765751720 for inside.20:10.3.5.50/19164 to outside.900:10.1.20.100/22 duration 0:00:00 bytes 21 TCP Reset-O from outside.900 543563431468&lt;BR /&gt;8/24/21 12:43:51 PM Error 302013 Built TCP FWNEWSITE 10.3.5.50 tcp/19164 FWNEWSITE_10.1.20.100 tcp/22 inbound tcp built 9010803 Built inbound tcp connection 9010803 for Outside.1010:10.3.5.50/19164 (10.3.5.50/19164) to identity:10.1.20.100/22 (10.1.20.100/22) 543563431461&lt;BR /&gt;8/24/21 12:43:51 PM Error 302014 Teardown TCP FWNEWSITE 10.3.5.50 tcp/19164 FWNEWSITE_10.1.20.100 tcp/22 tcp teardown 9010801 Teardown tcp connection 9010801 for Outside.1010:10.3.5.50/19164 to identity:10.1.20.100/22 duration 0:00:00 bytes 0 Flow terminated by TCP Intercept 543563431127&lt;BR /&gt;8/24/21 12:43:51 PM Error 302013 Built TCP FWNEWSITE 10.3.5.50 tcp/19164 FWNEWSITE_10.1.20.100 tcp/22 inbound tcp built 9010801 Built inbound tcp connection 9010801 for Outside.1010:10.3.5.50/19164 (10.3.5.50/19164) to identity:10.1.20.100/22 (10.1.20.100/22) 543563431125&lt;BR /&gt;8/24/21 12:43:51 PM Error 302013 Built TCP FW-HQ 10.3.5.50 tcp/19164 FWNEWSITE_10.1.20.100 tcp/22 inbound tcp built 2765751720 Built inbound tcp connection 2765751720 for inside.20:10.3.5.50/19164 (10.3.5.50/19164) to outside.900:10.1.20.100/22 (10.1.20.100/22) 543563430873&lt;/P&gt;&lt;P&gt;What i can see though is ISE doesnt match ciphers with C9.3K switches on new site:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;ISE/admin# ssh 10.1.20.1 admin&lt;BR /&gt;Failed to establish session with 10.1.20.1&lt;BR /&gt;no matching cipher found with 10.1.20.1: client aes256-cbc,aes128-cbc,aes128-gcm@openssh.com,aes256-gcm@openssh.com server aes128-gcm,aes256-gcm,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;ISE/admin# ssh 10.1.16.18 admin&lt;BR /&gt;Failed to establish session with 10.1.16.18&lt;BR /&gt;no matching cipher found with 10.1.16.18: client aes256-cbc,aes128-cbc,aes128-gcm@openssh.com,aes256-gcm@openssh.com server aes128-gcm,aes256-gcm,aes128-ctr,aes192-ctr,aes256-ctr&lt;/P&gt;&lt;P&gt;capture on FWNEWSITE/ (capture ISE real-time match ip 10.3.5.50) catches nothing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 11:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4454070#M569231</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-08-24T11:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: SXP between ASA and ISE fails</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4454424#M569249</link>
      <description>&lt;P&gt;&amp;gt; ..&amp;nbsp;&lt;SPAN&gt;tcp connection 2765751720 for &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;inside&lt;/STRONG&gt;&lt;/FONT&gt;.20:10.3.5.50/19164 to &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;outside&lt;/STRONG&gt;&lt;/FONT&gt;.900:10.1.20.100/22 ...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Should it not be inside to inside?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The reset is due to&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/asdm71/firewall/asdm_71_firewall_config/protect_tools.html#49848" target="_blank"&gt;Configuring TCP Options&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Try &lt;A href="https://community.cisco.com/t5/security-documents/troubleshooting-access-problems-using-packet-tracer/ta-p/3114976" target="_self"&gt;(Cisco Community) Troubleshooting Access Problems Using Packet-Tracer&lt;/A&gt;&amp;nbsp;?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Aug 2021 00:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-between-asa-and-ise-fails/m-p/4454424#M569249</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2021-08-25T00:10:46Z</dc:date>
    </item>
  </channel>
</rss>

