03-10-2021 10:02 PM - edited 03-10-2021 10:16 PM
Hi Experts,
We are doing monitoring for certain ISE ports, to check the availability of ISE services and infrastructure.
In these include all the mandatory ports as well some other ports, of which 8084 is also a part.
Now from last 2 days we are getting alerts indicating that the port 8084 is not reachable, and from the documentation I see that this port is used for BYOD for Android devices.
Telneting to this ports also fails...
Now the question is how do I find and restart the service using this port?
Solved! Go to Solution.
03-11-2021 05:26 AM
Hi @dgaikwad
you are correct, TCP/8084 is used for Android devices with EST authentication (ISE Installation Guide).
You are able to check the TCP/8084 with: show ports or show tech-support:
*****************************************
Displaying show ports
*****************************************
...
Process : nginx: (10649)
tcp: 0.0.0.0:8084
...
*****************************************
Running netstat -tunap...
*****************************************
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
...
tcp 0 0 0.0.0.0:8084 0.0.0.0:* LISTEN 10649/nginx: master
...
As soon as it's an EST authentication ... please check at:
Work Centers > BYOD > Portals & Components > Certificates > Internal CA Settings
CA, EST & OCSP Responder Status
If it is DISABLE, then click on Enable Certificate Authority.
Please also take a look at:
CSCvv49403 8084/TCP EST service allowing weak and not FIPS compliant ciphers.
Hope this helps !!!
03-11-2021 05:26 AM
Hi @dgaikwad
you are correct, TCP/8084 is used for Android devices with EST authentication (ISE Installation Guide).
You are able to check the TCP/8084 with: show ports or show tech-support:
*****************************************
Displaying show ports
*****************************************
...
Process : nginx: (10649)
tcp: 0.0.0.0:8084
...
*****************************************
Running netstat -tunap...
*****************************************
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
...
tcp 0 0 0.0.0.0:8084 0.0.0.0:* LISTEN 10649/nginx: master
...
As soon as it's an EST authentication ... please check at:
Work Centers > BYOD > Portals & Components > Certificates > Internal CA Settings
CA, EST & OCSP Responder Status
If it is DISABLE, then click on Enable Certificate Authority.
Please also take a look at:
CSCvv49403 8084/TCP EST service allowing weak and not FIPS compliant ciphers.
Hope this helps !!!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide