11-27-2024 12:56 AM
Hi guys
I had an external repository setup in Cisco Catalyst Center 2.3.7.6, which worked well.
After upgrading and renewing the backend server because of a lifecycle and upgrading Cisco Catalyst Center to 2.3.7.7, I am not able to add the same external repository anymore:
I think it does correspond with the changed SSH key on the server, but how can I renew / delete the old one on the Cisco Catalyst Center?
I tried to connect via SSH from CLI / maglev and this worked with the new server.
Thanks and best regards
Dominic
Solved! Go to Solution.
01-09-2025 05:46 AM
Hi @Dominic Stalder
Thanks for the fast reply.
We are also using Rocky Linux 9 here, and got it working again!
The issue was that we are using a custom distributed configuration for sshd.
So the solution was to add the missing
Include /etc/crypto-policies/back-ends/opensshserver.config
(which normally is part of the
/etc/ssh/sshd_config.d/50-redhat.conf
config file)
It seems like the sshd config is just too secure without referencing the system wide crypto-policies.
Regards
Manuel
11-27-2024 02:11 AM
Hello Dominic,
Have you tryed deleting the external reposity and setting it up again?
BR
11-27-2024 02:24 AM
01-09-2025 04:34 AM
Hi @Dominic Stalder
we are encountering the exact same issue after Upgrading from Cisco DNAC to CCC.
Could you fix the issue?
Br
Manuel
01-09-2025 05:18 AM
Hi @Manuel K.
we were able to fix it, but not on Cisco side. We migrated the SFTP server back from Rocky 9.5 to Ubuntu 22.04 LTS.
Based on the release notes, Rocky is not officially supported, even if the binaries are compatible with RedHat Enterprise (RHE).
Backup Server Requirements
The backup server must run one of the following operating systems:
- RedHat Enterprise (or CentOS) 8 or later
- Ubuntu 16.04 (or Mint, etc) or later
We did not have the nerves to have this discussion with Cisco TAC and just re-setup the new SFTP server with Ubuntu.
Regards
Dominic
01-09-2025 05:46 AM
Hi @Dominic Stalder
Thanks for the fast reply.
We are also using Rocky Linux 9 here, and got it working again!
The issue was that we are using a custom distributed configuration for sshd.
So the solution was to add the missing
Include /etc/crypto-policies/back-ends/opensshserver.config
(which normally is part of the
/etc/ssh/sshd_config.d/50-redhat.conf
config file)
It seems like the sshd config is just too secure without referencing the system wide crypto-policies.
Regards
Manuel
01-09-2025 05:56 AM
Hi @Manuel K.
oh cool, thanks a lot for this information. I know, that our Linux team also tried with different ciphers, even allowing older ciphers. But I will forward this information to our team, thanks a lot!
Regards
Dominic
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide