<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Services Engine (ISE) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020877#M587448</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/834064"&gt;@RS19&lt;/a&gt;:&amp;nbsp; it is using one of the following algorithms:&lt;/P&gt;&lt;P&gt;Kexalgorithms curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1&lt;/P&gt;&lt;P&gt;Now if you want to be sure which one is using, start removing one of these at the times and restart the sshd daemon on the NCM, I assume that it is Linux, then test again from the ISE using "show repository".&amp;nbsp; Keep removing enough until it fails.&amp;nbsp; When it fails, that's your answer.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Feb 2024 20:14:58 GMT</pubDate>
    <dc:creator>adamscottmaster2013</dc:creator>
    <dc:date>2024-02-19T20:14:58Z</dc:date>
    <item>
      <title>Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019203#M587385</link>
      <description>&lt;P&gt;This is regarding ISE. I am using Manage Engine (NCM) to take the backup of ISE.&lt;/P&gt;&lt;P&gt;In NCM there are many Key EXchanges allowed. When all the Key exchanges are selected at the NCM side the backup of ISE &amp;gt; NCM is successful.&amp;nbsp;&lt;BR /&gt;But as per secutiy only specific key exchanges needs to be allowed.&lt;/P&gt;&lt;P&gt;I need to identify which key exchange my ISE is using, so that I can configure the same in the NCM. How to identify it.&lt;BR /&gt;Below is the output of &lt;STRONG&gt;show crypto host_keys &lt;/STRONG&gt;from ISE, where 10.10.10.10 is the NCM server IP&lt;BR /&gt;&lt;BR /&gt;1024 SHA256:xxxxxxxxxxxxxxxxxdfdfereddredddddd 10.10.10.10 (RSA)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;From the above output is it possible to identify which key algorithm is used ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 11:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019203#M587385</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2024-02-16T11:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019299#M587386</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/834064"&gt;@RS19&lt;/a&gt;:&amp;nbsp; ISE is running either CentOS-7 or CentOS-8 and the configuration is in the /etc/ssh/ssh_config file (you need root to change this).&amp;nbsp; By default, it will send out the followings:&lt;/P&gt;&lt;P&gt;debug2: host key algorithms: &lt;A href="mailto:rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com" target="_blank"&gt;rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It is up to your NCM to accept or refuse what can be allowed.&amp;nbsp; For example, I only accept these host algorithms on my Linux server:&lt;/P&gt;&lt;P&gt;debug2: peer server KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521&lt;BR /&gt;&lt;STRONG&gt;debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519&lt;/STRONG&gt;&lt;BR /&gt;debug2: ciphers ctos: aes256-ctr,aes256-gcm@openssh.com&lt;BR /&gt;debug2: ciphers stoc: aes256-ctr,aes256-gcm@openssh.com&lt;BR /&gt;debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha2-256,hmac-sha2-512&lt;BR /&gt;debug2: MACs stoc: &lt;A href="mailto:hmac-sha2-256-etm@openssh.com,hmac-sha2-256,hmac-sha2-512" target="_blank"&gt;hmac-sha2-256-etm@openssh.com,hmac-sha2-256,hmac-sha2-512&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Therefore, it is up to you to configure on the NCM on what you can accept.&amp;nbsp; On most Linux systems, that would be in the /etc/ssh/sshd_config&lt;/P&gt;&lt;P&gt;Does that make sense?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 13:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019299#M587386</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-02-16T13:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019459#M587389</link>
      <description>&lt;P&gt;ISE is not based on CENTOS.&amp;nbsp; It is based on RHEL.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 16:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019459#M587389</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-02-16T16:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019461#M587390</link>
      <description>&lt;P&gt;What do you mean by "take the backup of ISE".&amp;nbsp; ISE doesn't support any backup utilities other than the built one which copies the backup files to an external repository.&amp;nbsp; Do you mean you are only having NCM do a "show run" of the CLI?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 16:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019461#M587390</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-02-16T16:40:35Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019814#M587396</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;:&amp;nbsp; It is almost exactly the same.&amp;nbsp; If you look at the /etc/ssh/ssh_config and /etc/ssh/sshd_config file in both CentOS and RHEL, they are both identical.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Feb 2024 13:43:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019814#M587396</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-02-17T13:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019952#M587402</link>
      <description>&lt;P&gt;Thanks for your explanation. But would like to clarify the below.&lt;BR /&gt;The below has been enabled in my ISE&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;1024 SHA256:xxxxxxxxxxxxxxxxxdfdfereddredddddd 10.10.10.10 (RSA)&lt;/SPAN&gt;&lt;BR /&gt;10.10.10.10 is my NCM server IP address.&lt;BR /&gt;In my NCM have enabled as attached.&amp;nbsp;&lt;BR /&gt;Irrespective of that it is not working ?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 04:23:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019952#M587402</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2024-02-18T04:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019953#M587403</link>
      <description>&lt;P&gt;In NCM rsa1024-sha1 is enabled.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 04:23:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019953#M587403</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2024-02-18T04:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019955#M587405</link>
      <description>&lt;P&gt;In addition, I did SSH to the ISE &amp;amp; I am in /admin&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;BR /&gt;From this prompt how to check the config file.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 05:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5019955#M587405</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2024-02-18T05:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020051#M587408</link>
      <description>You don’t. ISE config is GUI and API driven. &lt;BR /&gt;</description>
      <pubDate>Sun, 18 Feb 2024 12:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020051#M587408</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-02-18T12:44:06Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020112#M587411</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/834064"&gt;@RS19&lt;/a&gt;:&amp;nbsp; What are you trying to accomplish?&amp;nbsp; Are you trying to ssh/sftp from the NCM to the ISE or are you trying to ssh/sftp from the ISE to the NCM?&amp;nbsp; Please elaborate.&lt;/P&gt;&lt;P&gt;If you're are trying to ssh from the NCM to the ISE and you want to lock down the ISE, you can do this on the ISE:&lt;/P&gt;&lt;P&gt;service sshd enable&lt;BR /&gt;service sshd encryption-algorithm aes256-ctr&lt;BR /&gt;service sshd encryption-mode ctr&lt;BR /&gt;service sshd key-exchange-algorithm ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521&lt;BR /&gt;service sshd loglevel 4&lt;/P&gt;&lt;P&gt;Even then, it is not completed.&amp;nbsp; If you want to lock it down further, open a ticket with TAC and they will root into the ISE and lock it down from "/etc/ssh/sshd_config".&lt;/P&gt;&lt;P&gt;If you&amp;nbsp; ssh from the ISE to the NCM, then you need to modify the /etc/ssh/sshd_config on the NCM.&amp;nbsp; The other way is to lock down the /etc/ssh/ssh_config on the ISE but this method will require TAC to root into the ISE and make the configuration chance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 16:24:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020112#M587411</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-02-18T16:24:07Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020162#M587412</link>
      <description>&lt;P&gt;If the ISE CLI does not tell you much more (e.g. you can enable a debug and then run a show repo),&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;debug transfer 7
show repo MyRepoName&lt;/LI-CODE&gt;
&lt;P&gt;then run a tcpdump on that node and analyse the TCP handshake in wireshark.&lt;/P&gt;
&lt;P&gt;You'll need a TAC case to access any of the Linux /etc files if that is indeed the solution to your problem.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 20:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020162#M587412</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-18T20:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020221#M587419</link>
      <description>&lt;P&gt;The ISE which is used is Windows based system. In this scenario where should I check the settings ?&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 23:57:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020221#M587419</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2024-02-18T23:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020222#M587420</link>
      <description>&lt;P&gt;You're using NCM (Network Configuration Manager) from Solarwinds to run an SFTP server - that runs on Windows. Ok. I am not too familiar with NCM, but the NCM system I have access to has a very primitive SFTP implementation. I don't see any nerd knobs to change much. All you can do is add user accounts and&amp;nbsp; set a common base directory.&lt;/P&gt;
&lt;P&gt;Perhaps consider using a more capable SFTP implementation - e.g. Linux&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 00:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020222#M587420</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-19T00:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020235#M587421</link>
      <description>&lt;P&gt;sorry ignore the above&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 01:55:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020235#M587421</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2024-02-19T01:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020341#M587422</link>
      <description>&lt;P&gt;I am tyring to take hte configuration datta backup of the Cisco ISE to Device Expert NCM using SFTP.&lt;BR /&gt;If fails.&amp;nbsp;&lt;BR /&gt;In NCM there are many Key EXchanges allowed. When all the Key exchanges are selected at the NCM side the backup of ISE &amp;gt; NCM is successful.&amp;nbsp;&lt;BR /&gt;But as per secutiy only specific key exchanges needs to be allowed.&lt;/P&gt;&lt;P&gt;I need to identify which key exchange my ISE is using, so that I can configure the same in the NCM. How to identify it.&lt;BR /&gt;Below is the output of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;show crypto host_keys&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;from ISE, where 10.10.10.10 is the NCM server IP&lt;BR /&gt;&lt;BR /&gt;1024 SHA256:xxxxxxxxxxxxxxxxxdfdfereddredddddd 10.10.10.10 (RSA)&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 06:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020341#M587422</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2024-02-19T06:00:08Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020348#M587423</link>
      <description>&lt;P&gt;I did the command show repo "myreponame"&lt;BR /&gt;Got the error that %Error: Repository&amp;nbsp;myreponame could not be accessed. In case Backup was Restored on different setup, Please reconfigure the repository&amp;nbsp; (expected behaviour)&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 06:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020348#M587423</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2024-02-19T06:09:39Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020353#M587424</link>
      <description>&lt;P&gt;I am taking the configuration back up of ISE&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 06:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020353#M587424</guid>
      <dc:creator>RS19</dc:creator>
      <dc:date>2024-02-19T06:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020702#M587438</link>
      <description>&lt;P&gt;So did you restore?&amp;nbsp; Is this is a new setup?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 13:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020702#M587438</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-02-19T13:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020877#M587448</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/834064"&gt;@RS19&lt;/a&gt;:&amp;nbsp; it is using one of the following algorithms:&lt;/P&gt;&lt;P&gt;Kexalgorithms curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1&lt;/P&gt;&lt;P&gt;Now if you want to be sure which one is using, start removing one of these at the times and restart the sshd daemon on the NCM, I assume that it is Linux, then test again from the ISE using "show repository".&amp;nbsp; Keep removing enough until it fails.&amp;nbsp; When it fails, that's your answer.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 20:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020877#M587448</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-02-19T20:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Services Engine (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020887#M587453</link>
      <description>&lt;P&gt;First, get a warm fuzzy feeling that the comms to the repo is working.&amp;nbsp; I would do the following.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;place any file in the directory to which the repo is pointing (e.g. a text file)&lt;/LI&gt;
&lt;LI&gt;check in the ISE CLI that you can see the file when you issue the CLI command "show repo myreponame"&lt;/LI&gt;
&lt;LI&gt;If that fails, then re-run the same command with debug enabled - the debug command is "debug transfer 7"&lt;/LI&gt;
&lt;LI&gt;Failing that, go back into ISE GUI and re-configure the repo password - and then set the same password in the NCM for that user account&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;if all that doesn't work, then you have a deeper issue. Perhaps try FTP instead of SFTP to see if you have any better luck (although FTP uses different TCP ports to SFTP)&lt;/P&gt;
&lt;P&gt;Some ISE versions were a bit buggy with regards to SFTP - what version are you running and what patch level?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 20:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/identity-services-engine-ise/m-p/5020887#M587453</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-19T20:51:53Z</dc:date>
    </item>
  </channel>
</rss>

