<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE BackUp in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5139205#M590390</link>
    <description>Thank you Arne.&lt;BR /&gt;Based on TCPdump and manual SSH from ISE box into server of Repository, it seems that port TCP22 is allowed.&lt;BR /&gt;</description>
    <pubDate>Wed, 03 Jul 2024 05:03:01 GMT</pubDate>
    <dc:creator>Netmart</dc:creator>
    <dc:date>2024-07-03T05:03:01Z</dc:date>
    <item>
      <title>Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138025#M590329</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am wondering, what the root cause could for failing to send generated backup to remote repository.&lt;/P&gt;&lt;P&gt;Running the back on ISE box itself, all phase can be traced.&lt;/P&gt;&lt;P&gt;And it seems that the configuring is completed, but the transfer is failing - here I was using TFTP.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;% backup in progress: Moving Backup file to the repository...75% completed&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;% &lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;I&gt;Transfer timed out&lt;/I&gt;&lt;/STRONG&gt;&lt;I&gt;.&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&amp;nbsp;% File transfer error&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;I&gt;% Internal CA Store is not included in this backup. It is recommended to export it using "application configure &lt;/I&gt;&lt;I&gt;ise&lt;/I&gt;&lt;I&gt;" CLI command &lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;% Creating backup with timestamped filename: ConfigBackup-CLI-CFG10-200326-0705.tar.gpg &lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;% backup in progress: Starting Backup...10% completed &lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;% backup in progress: Validating ISE Node Role...15% completed&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;% backup in progress: Backing up ISE Configuration Data...20% completed&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;% backup in progress: Backing up ISE Indexing Engine Data...45% completed&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;% backup in progress: Backing up ISE Logs...50% completed&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;% backup in progress: Completing ISE Backup Staging...55% completed&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;% backup in progress: Backing up ADEOS configuration...55% completed &lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;% backup in progress: Moving Backup file to the repository...75% completed&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;% &lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;I&gt;Transfer timed out&lt;/I&gt;&lt;/STRONG&gt;&lt;I&gt;.&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&amp;nbsp;% File transfer error&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jun 2024 05:38:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138025#M590329</guid>
      <dc:creator>Netmart</dc:creator>
      <dc:date>2024-06-30T05:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138028#M590331</link>
      <description>&lt;P&gt;what ISE version ?&lt;/P&gt;
&lt;P&gt;what Model of Remote backup method ? SCP/FTP/SFTP ?&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;% backup in progress: Moving Backup file to the repository...75% completed&lt;/LI-CODE&gt;
&lt;P&gt;as per this error looks for me far end folder permission (repository) issue to write the files on the backup destination.&lt;/P&gt;
&lt;P&gt;You can also run debug on ISE and check what is the error :&lt;/P&gt;
&lt;PRE&gt;# debug backup-restore backup&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jun 2024 05:54:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138028#M590331</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-06-30T05:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138183#M590339</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/244740"&gt;@Netmart&lt;/a&gt;&amp;nbsp;- ISE allows you to configure a repository using various protocols (including tftp) - but what you do with that repository is important - for storing data, you can't use tftp as a protocol - you can use tftp repo for other things that do not involve writing data.&lt;/P&gt;
&lt;P&gt;The only supported protocols for an &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-2/admin_guide/b_ise_admin_3_2/b_ISE_admin_33_maintain_monitor.html?bookSearch=true#reference_7784840AC76E4E70AE1F21AFD45C5C4D" target="_self"&gt;ISE repo that involve storing data are ftp, SFTP, NSF and local disk&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jun 2024 21:35:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138183#M590339</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-06-30T21:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138272#M590342</link>
      <description>&lt;P&gt;Thank you very much Arne.&lt;/P&gt;&lt;P&gt;I set up sftp, also tested the privilege access to ISE destination folder by running a SFTP session, downloading a test file with the credentials configured in ISE:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Version:3.1.0.518&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;repository server-sftp&lt;BR /&gt;&amp;nbsp; url s&lt;A title="ftp://brutus/data/sftp/ise" target="_blank" rel="noreferrer noopener"&gt;ftp://server-sftp/data/sftp/ISE&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; user cisco password hash ******&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# backup test-server-sftp repository server-sftp ise-config encryption-key plain *****&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% Internal CA Store is not included in this backup. It is recommended to export it using "application configure ise" CLI command&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% Creating backup with timestamped filename: test-brutus-sftp-CFG10-240701-0018.tar.gpg&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% backup in progress: Starting Backup...10% completed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% backup in progress: Validating ISE Node Role...15% completed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% backup in progress: Backing up ISE Configuration Data...20% completed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% backup in progress: Backing up ISE Indexing Engine Data...45% completed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% backup in progress: Backing up ISE Logs...50% completed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% backup in progress: Completing ISE Backup Staging...55% completed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% backup in progress: Backing up ADEOS configuration...55% completed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% backup in progress: Moving Backup file to the repository...75% completed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% Failure occurred during request&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I hope we do&amp;nbsp; not hit:&amp;nbsp;&lt;SPAN class=""&gt;&lt;A title="https://bst.cisco.com/bugsearch/bug/cscwd63717?rfs=qvlogin" href="https://bst.cisco.com/bugsearch/bug/CSCwd63717?rfs=qvlogin" target="_blank" rel="noreferrer noopener"&gt;https://bst.cisco.com/bugsearch/bug/CSCwd63717?rfs=qvlogin&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 05:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138272#M590342</guid>
      <dc:creator>Netmart</dc:creator>
      <dc:date>2024-07-01T05:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138275#M590343</link>
      <description>&lt;P&gt;Are you able to view the directory contents of that SFTP repository, from the vantage of the ISE CLI?&amp;nbsp; Put a simple file in directory /server-sftp/data/sftp/ISE&amp;nbsp; &amp;nbsp; and then check if you can view the file:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show repo server-sftp&lt;/LI-CODE&gt;
&lt;P&gt;if that doesn't work, then I suspect that you haven't created the crypto host key on the CLI - if your repo URL is&lt;/P&gt;
&lt;P&gt;sftp://myserver.com/ then your command would be&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;crypto host_key add host myserver.com&lt;/LI-CODE&gt;
&lt;P&gt;if your repo URL contains an IP address, then use the IP address in the command above.&lt;/P&gt;
&lt;P&gt;A useful debugging command for seeing what ISE is doing when you test those show/backup commands:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;debug transfer 7&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 05:28:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138275#M590343</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-07-01T05:28:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138277#M590344</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Hello Arne, please see output below.&lt;/P&gt;&lt;P&gt;Since this is a production environment, does running "debug transfer 7" has any impact on ISE application services?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;sh repository server-sftp&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% Error: Repository server-sftp could not be accessed. In case Backup was Restored on different setup, Please reconfigure the repository passwords (expected behaviour).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;% Failure occurred during reques&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 05:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138277#M590344</guid>
      <dc:creator>Netmart</dc:creator>
      <dc:date>2024-07-01T05:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138279#M590345</link>
      <description>&lt;P&gt;...yes, host key has been added:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# crypto host_key add host server-sftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;host key fingerprint added&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Operating in CiscoSSL FIPS mode&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# Host server-sftp found:line 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;server-sftp&amp;nbsp; RSA SHA256:*******&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 05:42:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138279#M590345</guid>
      <dc:creator>Netmart</dc:creator>
      <dc:date>2024-07-01T05:42:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138283#M590346</link>
      <description>&lt;P&gt;It doesn't break to enable the debugs - just disable them once you're done.&lt;/P&gt;
&lt;P&gt;Do you have the &lt;STRONG&gt;plain text&lt;/STRONG&gt; password of the username "cisco" ? If so, then log into the ISE Admin GUI, and just overwrite the password for that repo config.&amp;nbsp; If you have done a config restore, then ISE will complain and force you to overwrite the password (even if the password hasn't changed)&lt;/P&gt;
&lt;P&gt;Can you ping the SFTP server?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 05:49:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138283#M590346</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-07-01T05:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138692#M590368</link>
      <description>Hi Arne,&lt;BR /&gt;I am able to ping the sftp server.&lt;BR /&gt;I also run from a different linux box sftp commnands to this repository/sftp-server by using same cisco user credentials - no problem.&lt;BR /&gt;&lt;BR /&gt;/admin# show repository server-sftp&lt;BR /&gt;6 [520055]:[info] transfer: cars_xfer.c[225] [admin]: sftp dir of repository server-sftp requested&lt;BR /&gt;6 [520055]:[info] transfer: cars_xfer_util.c[2297] [admin]: Server validation successful brutus&lt;BR /&gt;7 [520055]:[debug] transfer: sftp_handler.c[1095] [admin]: Running sftp command: brutus cisco *** /data/sftp/ISE/ ls -l /data/sftp/ISE/&lt;BR /&gt;6 [520055]:[info] transfer: sftp_handler.c[585] [admin]: DEBUG: local user: admin UID: 0 sftp_run_parent FD: 8 remote host: brutus remote user: cisco command: ls -l /data/sftp/ISE/&lt;BR /&gt;7 [520055]:[debug] transfer: sftp_handler.c[594] [admin]: fd is:8&lt;BR /&gt;7 [520061]:[debug] transfer: sftp_handler.c[292] [admin]: Executing SFTP command: 0 admin /usr/bin/sftp -oIdentityFile=/home/admin/.ssh/id_rsa -oUserKnownHostsFile=/home/admin/.ssh/known_hosts -oPasswordAuthentication=yes cisco@brutus&lt;BR /&gt;3 [520055]:[error] transfer: sftp_handler.c[365] [admin]: sftp_select Error: timeout!&lt;BR /&gt;7 [520055]:[debug] transfer: sftp_handler.c[964] [admin]: sftp parent status -999&lt;BR /&gt;% Error: Repository server-sftp could not be accessed. In case Backup was Restored on different setup, Please reconfigure the repository passwords (expected behaviour).&lt;BR /&gt;% Failure occurred during request&lt;BR /&gt;</description>
      <pubDate>Tue, 02 Jul 2024 02:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138692#M590368</guid>
      <dc:creator>Netmart</dc:creator>
      <dc:date>2024-07-02T02:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138702#M590371</link>
      <description>&lt;P&gt;It looks like TCP/22 is not allowed (blocked by firewall / ACL) between ISE and that SFTP server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Instead of ping, see if you can get a response from doing an SSH from the ISE CLI, to the SFTP server (SSH/SFTP normally default to TCP/22)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 02:30:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138702#M590371</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-07-02T02:30:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138863#M590379</link>
      <description>&lt;P&gt;There could be several things such as:&lt;/P&gt;&lt;P&gt;#1:&amp;nbsp; Firewalls/ACL between the ISE and sFTP server,&lt;/P&gt;&lt;P&gt;#2:&amp;nbsp; iptables on the sFTP server itself,&lt;/P&gt;&lt;P&gt;#3:&amp;nbsp; /etc/hosts.allow or /etc/hosts/deny on the sFTP server that prevents your ISE server to connect.&amp;nbsp; Yes, it is there, in addition to the iptables itself,&lt;/P&gt;&lt;P&gt;The best thing to do is to create a dummy sFTP on the ISE with the same hostname/IP address as the actual sFTP server (named it dummy or something like that) and gives it the same username/pw of the sFTP server.&amp;nbsp; After that, on the command, add the host key like "crypto host_key add host dummy.cisco.com" or "crypto host_key add host X.X.X.X".&amp;nbsp; Once you confirmed that the key is successfully added, do a "show repository dummy" and you should see a listing of all the file in that directory of the username you specified when creating the "dummy" repository.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can't get the host key added in ISE, it means tcp/22 is being blocked somewhere.&amp;nbsp; If you're able to successfully add the host key but can not view the repository, it means the sFTP server is likely implementing the /etc/hosts.allow or /etc/hosts.deny (assuming the username and pw is valid).&amp;nbsp; Remember, tcpdump is your friend....&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 11:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5138863#M590379</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-07-02T11:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5139050#M590383</link>
      <description>&lt;P&gt;All those restrictions can be be ruled out (!)&lt;/P&gt;&lt;P&gt;I was even able to SSH into server of repository by using same credentials.&lt;/P&gt;&lt;P&gt;I also took a tcpdump and monitored incoming ssh connections:&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Able to confirm the SSH connection between ISE box and repository has been established. However, ISE sends Finish and closes TCP connection without having any data sent.&lt;/P&gt;&lt;P&gt;12:40:10.817610 IP sftp-server.ssh &amp;gt; ise-box.37912: Flags [S.], seq 1378995211, ack 1513259488, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 8], length 0&lt;BR /&gt;12:40:10.820623 IP ise-box.37912 &amp;gt; sftp-server.ssh: Flags [.], ack 1, win 229, length 0&lt;BR /&gt;12:40:10.820996 IP ise-box.37912 &amp;gt; sftp-server.ssh: Flags [P.], seq 1:35, ack 1, win 229, length 34&lt;BR /&gt;12:40:10.821005 IP sftp-server.ssh &amp;gt; ise-box.37912: Flags [.], ack 35, win 58, length 0&lt;BR /&gt;12:40:11.026064 IP sftp-server.ssh &amp;gt; ise-box.37912: Flags [P.], seq 1:22, ack 35, win 58, length 21&lt;BR /&gt;12:40:11.029028 IP ise-box.37912 &amp;gt; sftp-server.ssh: Flags [.], ack 22, win 229, length 0&lt;BR /&gt;12:40:11.029860 IP ise-box.37912 &amp;gt; sftp-server.ssh: Flags [P.], seq 35:579, ack 22, win 229, length 544&lt;BR /&gt;12:40:11.029866 IP sftp-server.ssh &amp;gt; ise-box.37912: Flags [.], ack 579, win 62, length 0&lt;BR /&gt;12:40:11.032480 IP sftp-server.ssh &amp;gt; ise-box.37912: Flags [P.], seq 22:534, ack 579, win 62, length 512&lt;BR /&gt;12:40:11.042211 IP ise-box.37912 &amp;gt; sftp-server.ssh: Flags [P.], seq 579:851, ack 534, win 237, length 272&lt;BR /&gt;12:40:11.050075 IP sftp-server.ssh &amp;gt; ise-box.37912: Flags [P.], seq 534:1382, ack 851, win 66, length 848&lt;BR /&gt;12:40:11.093316 IP ise-box.37912 &amp;gt; sftp-server.ssh: Flags [.], ack 1382, win 250, length 0&lt;BR /&gt;12:41:11.089153 IP ise-box.37912 &amp;gt; sftp-server.ssh: Flags [F.], seq 851, ack 1382, win 250, length 0&lt;BR /&gt;12:41:11.095743 IP sftp-server.ssh &amp;gt; ise-box.37912: Flags [F.], seq 1382, ack 852, win 66, length 0&lt;BR /&gt;12:41:11.098674 IP ise-box.37912 &amp;gt; sftp-server.ssh: Flags [.], ack 1383, win 250, length 0&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I hope we do not hit the following bug, though we do run Service Pack3:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Host:&amp;nbsp; **&lt;/P&gt;&lt;P&gt;Personas:&amp;nbsp;Administration, Monitoring, Policy Service (SESSION,PROFILER,DEVICE ADMIN)&lt;/P&gt;&lt;P&gt;Role:&amp;nbsp;PRI(A), SEC(M)&lt;/P&gt;&lt;P&gt;System Time:&amp;nbsp;Jul 02 2024 12:24:18 PM******&lt;/P&gt;&lt;P&gt;FIPS Mode:&amp;nbsp;Disabled&lt;/P&gt;&lt;P&gt;Version:3.1.0.518&lt;/P&gt;&lt;P&gt;Patch Information:&amp;nbsp;3&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ISE 3.1 certain SFTP servers stopped working after upgrade to patch 4/5&lt;BR /&gt;CSCwd89657&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 16:59:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5139050#M590383</guid>
      <dc:creator>netmart2</dc:creator>
      <dc:date>2024-07-02T16:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5139205#M590390</link>
      <description>Thank you Arne.&lt;BR /&gt;Based on TCPdump and manual SSH from ISE box into server of Repository, it seems that port TCP22 is allowed.&lt;BR /&gt;</description>
      <pubDate>Wed, 03 Jul 2024 05:03:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5139205#M590390</guid>
      <dc:creator>Netmart</dc:creator>
      <dc:date>2024-07-03T05:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE BackUp</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5140802#M590440</link>
      <description>&lt;P&gt;Eventually, I was able to fix the sftp upload issue by removing the configured from GUI at:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Admin&amp;nbsp; &amp;gt; System &amp;gt; Maintenance &amp;gt; Repository&lt;/P&gt;&lt;P&gt;And creating the repository via CLI.&lt;/P&gt;&lt;P&gt;% Internal CA Store is not included in this backup. It is recommended to export it using "application configure ise" CLI command&lt;/P&gt;&lt;P&gt;% Creating backup with timestamped filename: test-sftp-CFG10-240705-1724.tar.gpg&lt;/P&gt;&lt;P&gt;% backup in progress: Starting Backup...10% completed&lt;/P&gt;&lt;P&gt;% backup in progress: Validating ISE Node Role...15% completed&lt;/P&gt;&lt;P&gt;% backup in progress: Backing up ISE Configuration Data...20% completed&lt;/P&gt;&lt;P&gt;% backup in progress: Backing up ISE Indexing Engine Data...45% completed&lt;/P&gt;&lt;P&gt;% backup in progress: Backing up ISE Logs...50% completed&lt;/P&gt;&lt;P&gt;% backup in progress: Completing ISE Backup Staging...55% completed&lt;/P&gt;&lt;P&gt;% backup in progress: Backing up ADEOS configuration...55% completed&lt;/P&gt;&lt;P&gt;% backup in progress: Moving Backup file to the repository...75% completed&lt;/P&gt;&lt;P&gt;% backup in progress: Completing Backup...100% completed&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2024 22:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-backup/m-p/5140802#M590440</guid>
      <dc:creator>netmart2</dc:creator>
      <dc:date>2024-07-05T22:32:58Z</dc:date>
    </item>
  </channel>
</rss>

