<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ISE - root mode in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076068#M1069600</link>
    <description>&lt;P&gt;By hacking the root shell on ISE you are putting the appliance into an unsupported configuration. This is very strongly discouraged and may leave you with a non-working configuration.&lt;/P&gt;</description>
    <pubDate>Wed, 29 Apr 2020 05:38:33 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-04-29T05:38:33Z</dc:date>
    <item>
      <title>Cisco ISE - root mode</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/2827603#M434368</link>
      <description>&lt;P&gt;Greetings all, I wonder if q someone could give me a hand with this.&lt;BR /&gt;I'm having problems with synchronization of the time of my microsoft NTP and ISE appliance, making and reviewed the internet and tells me that I have to make certain settings on the ISE as root, but not how to enter that mode.&lt;BR /&gt;Does anyone know how to enter the appliance as root ISE?&lt;BR /&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:38:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/2827603#M434368</guid>
      <dc:creator>JLaime001</dc:creator>
      <dc:date>2020-02-21T13:38:23Z</dc:date>
    </item>
    <item>
      <title>I'm surprised that document</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/2827604#M434374</link>
      <description>&lt;P&gt;I'm surprised that document got through TAC review for publication.&lt;/P&gt;
&lt;P&gt;The ISE root shell is only accessible via the TAC-use-only root patch (ISE 1.4 and below) or the new "tech support-tunnel" (ISE 2.0).&lt;/P&gt;
&lt;P&gt;End users (i.e .customer admins) do not have have access to the ISE root (Linux OS shell).&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 20:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/2827604#M434374</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-09T20:18:18Z</dc:date>
    </item>
    <item>
      <title>Thanks for sharing this file.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/2827605#M434381</link>
      <description>&lt;P&gt;Thanks for sharing this file. Now I can fix this issue on my side. Temporarily what I did was to configure my 6500 SW as NTP Server for the ISE's. This 6500 SW was getting the clock with no issues from the NTP Windows Server and the ISE's as well. Let me open a case now so I can get the procedure from TAC to apply this fix. I would post the procedure here later.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In fact, I made on October 31st a major upgrade in our ISE deployment (10+ devices - distributed environment) from 1.2.1.198 patch 5 to 1.4 patch 3. I could not sync the ISE to the Microsoft NTP Servers and based on the Cisco TAC I was facing the following:&lt;/P&gt;
&lt;P&gt;The problem that you have with the ISE server and the NTP is a know issue that ISE has with the windows servers.&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;The problems is that ISE server has strong problem in to synchronize with an NTP windows server.&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;We found documentation that says that ISE server has problems with the NTP server for windows, as recommendation we point the ISE server to a local switch that was configured as ntp server, the Ise sever are now synchronized with the switch.&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;There are different recommendations to resolve this problem:&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL style="list-style-type: decimal; direction: ltr;"&gt;
&lt;LI style="font-size: 11pt;"&gt;Use a different server instead of windows ntp to do the time synchronization.&lt;/LI&gt;
&lt;LI style="color: #000000; font-family: 'Calibri','sans-serif'; font-size: 11pt;"&gt;Use a Cisco device like a switch or router as an NTP server to synchronize the ISE server.&lt;/LI&gt;
&lt;LI style="font-family: 'Calibri','sans-serif'; font-size: 11pt;"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_admin.html"&gt;&lt;U&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_admin.html&lt;/U&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;We in our webex session put as a test the second recommendation, you synchronized the ISE server with the switch and the ISE servers started synchronize correctly with the switch as an NTP server.&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;In this scenario the switch is synchronized with the NTP server and the ISE is synchronized with the switch, as a result the ISE server did not present any problem in the NTP synchronization with the switch.&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;these are the links about the problems:&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/ip/network-time-protocol-ntp/116161-trouble-ntp-00.html"&gt;&lt;U&gt;http://www.cisco.com/c/en/us/support/docs/ip/network-time-protocol-ntp/116161-trouble-ntp-00.html&lt;/U&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt;"&gt;&lt;A href="https://supportforums.cisco.com/discussion/11619556/synchronizing-cisco-ise-and-ntp-server"&gt;&lt;U&gt;https://supportforums.cisco.com/discussion/11619556/synchronizing-cisco-ise-and-ntp-server&lt;/U&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 21:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/2827605#M434381</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2015-12-11T21:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks for sharing this file.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/3889354#M434386</link>
      <description>&lt;P&gt;*root the VM's with redhat disc*&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.rootusers.com/how-to-reset-root-user-password-in-centos-rhel-7/" target="_blank"&gt;https://www.rootusers.com/how-to-reset-root-user-password-in-centos-rhel-7/&lt;/A&gt;&lt;BR /&gt;&amp;amp;&lt;BR /&gt;&lt;A href="https://www.rootusers.com/red-hat-certified-system-administrator-rhcsa-ex200-passed/" target="_blank"&gt;https://www.rootusers.com/red-hat-certified-system-administrator-rhcsa-ex200-passed/&lt;/A&gt;&lt;BR /&gt;~~~&lt;BR /&gt;Boot off Centos/rhel disc&lt;BR /&gt;Press 1 for single user mode&lt;BR /&gt;# chroot /mnt/sysimage&lt;BR /&gt;# passwd root&lt;BR /&gt;! set a password now.&lt;BR /&gt;! allow root login with ssh so you can login with ssh after rebooting.&lt;BR /&gt;# vi /etc/ssh/sshd_config - remove hash on "#PermitRootLogin yes" or if "PermitRootLogin no" make it "PermitRootLogin yes"&lt;BR /&gt;! if Cisco ACS 5.x - you can reboot now.&lt;BR /&gt;# exit - exit chrooted env&lt;BR /&gt;# touch /.autorelabel&lt;BR /&gt;# reboot&lt;BR /&gt;! if ISE - set /etc/shadow to read-only.&lt;BR /&gt;# chattr +i /etc/shadow&lt;BR /&gt;# exit - exit chrooted env&lt;BR /&gt;# touch /.autorelabel&lt;BR /&gt;# reboot&lt;BR /&gt;~~~&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2019 15:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/3889354#M434386</guid>
      <dc:creator>alextomko</dc:creator>
      <dc:date>2019-07-12T15:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks for sharing this file.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4075919#M1069588</link>
      <description>&lt;P&gt;Even so your thing works but it screws up a bunch. For example it no longer executes the show run or wr t in the ise admin CLI.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 21:30:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4075919#M1069588</guid>
      <dc:creator>LetsTryThis</dc:creator>
      <dc:date>2020-04-28T21:30:05Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks for sharing this file.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4075962#M1069592</link>
      <description>&lt;P&gt;Yes, this is true so you can just go into your linux root on ssh when you need to use the Cisco ISE cli and do a&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"chattr -i /etc/shadow" and when you are done and make sure to do this before rebooting again do a:&amp;nbsp; "chattr +i /etc/shadow".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I rarely ever need to use the Cisco's ISE cli and that is the only harm I see it cause is that you cannot use the show run/config changes in the Cisco ISE cli, so you have to decide what is most important to you and for me having linux root is more critical since I rarely ever make changes in the Cisco ISE cli and if I need to it is a simple config to allow changes to be made with the chattr in root.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you do run the "chattr -i /etc/shadow" to make changes in the Cisco ISE cli, before you reboot you need to make sure you "chattr +i /etc/shadow" or your root will dissapear after rebooting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 23:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4075962#M1069592</guid>
      <dc:creator>alextomko</dc:creator>
      <dc:date>2020-04-28T23:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks for sharing this file.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4075987#M1069593</link>
      <description>&lt;P&gt;What does this shadow file do ? I know it stores the encrypted passwords. Wouldn’t there be a way to create a new user which would have root access and would not require the shadow file to be read only. There seems to be other commands which a change of the shadow file will fail other then show run and wr t. For example show user fails as well&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 00:11:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4075987#M1069593</guid>
      <dc:creator>LetsTryThis</dc:creator>
      <dc:date>2020-04-29T00:11:04Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks for sharing this file.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076001#M1069594</link>
      <description>&lt;P&gt;You can create a new user just as you would in any other linux distribution, not going to go through that here. If your not well versed in linux then I would not say doing this to maintain root might not be beneficial for you. I have created another user with appropriate sudo permissions which can be done in /etc/sudoers but the same thing happens if you reboot without /etc/shadow being chattr + then you go back to non root - regardless of having other users than the "root" user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have found that any command can be completed in the Cisco ISE CLI once you have done chattr -i /etc/shadow but you'll lose your root if you keep it that way so its up to you if you want to maintain root, and to do that before any reboot I have had to do "chattr +i /etc/shadow".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 00:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076001#M1069594</guid>
      <dc:creator>alextomko</dc:creator>
      <dc:date>2020-04-29T00:49:24Z</dc:date>
    </item>
    <item>
      <title>Cisco ISE - root mode</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076068#M1069600</link>
      <description>&lt;P&gt;By hacking the root shell on ISE you are putting the appliance into an unsupported configuration. This is very strongly discouraged and may leave you with a non-working configuration.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 05:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076068#M1069600</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-04-29T05:38:33Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks for sharing this file.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076070#M1069601</link>
      <description>&lt;P&gt;Thanks for the advice, I am sure the earns you an extra sticker from Cisco.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 04:51:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076070#M1069601</guid>
      <dc:creator>LetsTryThis</dc:creator>
      <dc:date>2020-04-29T04:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks for sharing this file.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076071#M1069602</link>
      <description>&lt;P&gt;Thanks I wasn’t sure if the Cisco process would get rid of any new user as well and remove its root access.&lt;/P&gt;&lt;P&gt;so basically make the change as per your instruction and do what I need to do, then go and undo the read only in shadow file and stuff should work as normal for cli admin. Will i lose root access without reboot or only after reboot ? If so I just need to make sure shadow is read only when I reboot.&lt;/P&gt;&lt;P&gt;thanks for insight&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 04:58:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076071#M1069602</guid>
      <dc:creator>LetsTryThis</dc:creator>
      <dc:date>2020-04-29T04:58:02Z</dc:date>
    </item>
    <item>
      <title>Cisco ISE - root mode</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076082#M1069604</link>
      <description>&lt;P&gt;I've seen more than one appliance get bricked by well-meaning sys admins trying to subvert the built-in guard rails that Cisco has. When you see under the covers at all of the various processes, databases and interdependencies that allow ISE to do what it does, you will think long and hard before circumventing the system's built-in restrictions.&lt;/P&gt;
&lt;P&gt;If you legitimately need something done as root, TAC can assist. Open a case and they will install a root patch and perform the necessary modifications in a live WebEx session with you.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 05:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4076082#M1069604</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-04-29T05:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks for sharing this file.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4267816#M1077075</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1040756"&gt;@LetsTryThis&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;everyone here is encouraged to avoid rude &amp;amp; unpolite statements toward members. but actually this is what your parents should teach u in 1st approach.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 14:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4267816#M1077075</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-01-06T14:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - root mode</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4463554#M1083538</link>
      <description>&lt;P&gt;For what it is worth, I want to agree with what Marvin is saying. While I have never gone into the shell within ISE, I have in Prime to extend the number of lines in a report before it truncates. In doing so I accidentally added a space into the file and bricked the server. Found out the reason only after reimaging and rebuilding the application. I would assume the same would hold true to ISE, 1 single incorrect character in a the right file and Poof!!! there goes your application.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 19:34:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ise-root-mode/m-p/4463554#M1083538</guid>
      <dc:creator>DuaneSwiftII3815</dc:creator>
      <dc:date>2021-09-10T19:34:50Z</dc:date>
    </item>
  </channel>
</rss>

