www.cisco.com Open in urlscan Pro
2a02:26f0:3500:893::b33  Public Scan

URL: https://www.cisco.com/c/en/us/support/web/tac/tac-customer-file-uploads.html
Submission: On November 14 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * Skip to content
 * Skip to search
 * Skip to footer

 * Cisco.com Worldwide
 * Products and Services
 * Solutions
 * Support
 * Learn
 * Explore Cisco
 * How to Buy
 * Partners Home
 * Partner Program
 * Support
 * Tools
 * Find a Cisco Partner
 * Meet our Partners
 * Become a Cisco Partner

 * 
 * Support


CUSTOMER FILE UPLOADS TO CISCO TECHNICAL ASSISTANCE CENTER

Save
Log in to Save Content

Translations

Print


AVAILABLE LANGUAGES

 * Arabic - عربي
 * Brazil - Português
 * Canada - Français
 * China - 简体中文
 * China - 繁體中文 (臺灣)
 * Germany - Deutsch
 * Italy - Italiano
 * Japan - 日本語
 * Korea - 한국어
 * Latin America - Español
 * Netherlands - Nederlands

Updated:April 12, 2024
Document ID:1510676978683359
Bias-Free Language


BIAS-FREE LANGUAGE

The documentation set for this product strives to use bias-free language. For
the purposes of this documentation set, bias-free is defined as language that
does not imply discrimination based on age, disability, gender, racial identity,
ethnic identity, sexual orientation, socioeconomic status, and
intersectionality. Exceptions may be present in the documentation due to
language that is hardcoded in the user interfaces of the product software,
language used based on RFP documentation, or language that is used by a
referenced third-party product. Learn more about how Cisco is using Inclusive
Language.


CONTENTS

Introduction
Overview
Support Case Manager File Upload
      Uploading a File to a Case
Customer eXperience Drive
      Service Summary
      Supported Protocols
      CXD Upload Token
      Retrieving the Upload Token for an SR
           Using SCM
           Using the API
      Uploading Files to CXD
           Using Desktop Clients
           Directly from a Cisco Device
           File Upload API
           Sample Python Code to use the PUT API
Email File Attachment Uploads
Encrypting Files
      Encrypting Files Using WinZip
      Encrypting Files Using Tar and OpenSSL
      Encrypting Files Using Gzip and GnuPG
Communicating the Password to the TAC Customer Support Engineer
Customer Case Attachments Data Management
Summary
Additional Information



INTRODUCTION

This document describes how to upload files to Cisco Technical Assistance Center
(TAC).


OVERVIEW

The TAC customer support engineers can assist you with resolving an issue in a
timely manner when they have relevant files attached to the issue. You have
several options to upload the files related to your issue. Some of these options
are less secure, and can lead to certain inherent risks, and each option has
limitations that you need to consider before deciding on an appropriate upload
option. Table 1 summarizes the available upload options with details on file
encryption capabilities, recommended files size limits, and other relevant
information.

Table 1. Available Upload Options

Available Option (In Order of Preference) Files are Encrypted in Transit Files
are Encrypted at Rest Recommended File Size Limit Support Case Manager (SCM)
How To
Yes
Yes
No limit
Customer eXperience Drive
How To
Yes*
Yes
No limit
Email to attach@cisco.com
How To
No**
Yes
20 MB or less based on customer mail server limits

*Applies to all protocols except FTP. When using FTP, it is highly recommended
that the data is encrypted before being uploaded.

**You must encrypt prior to transit. Secure transit is guaranteed only from the
point where the email/attachment reaches the Cisco network, not on the customer
network or email provider side.


SUPPORT CASE MANAGER FILE UPLOAD

The Support Case Manager (SCM) file upload method is a secure option for
uploading files to cases. The communication channel between your computing
device and Cisco is encrypted. Files uploaded through SCM are immediately linked
to the associated case and stored in an encrypted format.


UPLOADING A FILE TO A CASE

After you submit the case, you can upload files.

Step 1. Log in to SCM.

Step 2. In order to view and edit the case, click the case number or case title
in the list. The Case Summary page opens.

Step 3. Click Add Files in order to choose a file and upload it as an attachment
to the case. The system displays the SCM File Uploader tool.



Step 4. In the Choose Files to Upload dialog box, drag the files that you want
to upload or click inside to browse your local machine for files to upload.

Step 5. Add a description and specify a category for all files, or individually.

Note: In order to optimize the upload settings for your network condition,
click Optimize Upload Settings.

Step 6. Click Upload in order to start the upload process.



Step 7. Once all uploads are complete, you can close the window or click Add
More Files in order to upload more files.



Step 8. Uploaded files can be managed in the Attachments tab.



Return to Top


CUSTOMER EXPERIENCE DRIVE


SERVICE SUMMARY

The Customer eXperience Drive (CXD) is a multi-protocol file upload service with
no limitation on the uploaded file size. It helps Cisco customers with active
Service Requests (SRs) to upload data directly to a case using a unique set of
credentials created per SR. The protocols supported by CXD are natively
supported by Cisco products which allows for uploading directly from Cisco
devices to SRs.


SUPPORTED PROTOCOLS

Table 2 summarizes the protocols supported by CXD. It is worth noting that
regardless of the protocol used, there is no limit set on the uploaded file
size.

Table 2. CXD Supported Protocols

Name Protocol/Port Encrypted Data Channel Ports Notes Secure File Transfer
Protocol (SFTP)
TCP/22
Yes
N/A
  Secure Copy Protocol (SCP)
TCP/22
Yes
N/A
  Hyper Text Transfer Protocol over SSL (HTTPS)
TCP/443
Yes
N/A
Only API-based uploads are supported. File Transfer Protocol of SSL (FTPS)
Implicit
TCP/990
Yes
30000-40000
Firewalls cannot inspect FTPS, as the control channel is encrypted. Hence, the
firewall needs to allow outbound connectivity to the entire data channel port
range. File Transfer Protocol of SSL (FTPS) Explicit
TCP/21
Yes
30000-40000
File Transfer Protocol (FTP)
TCP/21
Yes
30000-40000
Cisco does not recommend using FTP at all, since the protocol does not support
encryption. If it must be used, data needs to be encrypted before transfer.

Firewalls must inspect FTP traffic to allow data channels to be properly
established. If FTP is not inspected throughout the network, firewalls need to
allow outbound connectivity to the entire data channel port range.


CXD UPLOAD TOKEN

CXD creates unique upload tokens per SR. The SR number and the token are used as
the username and password to authenticate to the service and subsequently upload
files to the SR.

Note: The token is for upload only and does not allow the user to access case
files, or even files currently being uploaded. If the user would like to view
case files, that can only be done in SCM.


RETRIEVING THE UPLOAD TOKEN FOR AN SR

USING SCM

When an SR is opened, users must create the upload token to upload the
attachment.

In order to retrieve/generate the upload token, complete these steps:

Step 1. Log in to SCM.

Step 2. In order to view and edit a case, click the case number or case title in
the list. The Case Summary page opens.

Step 3. Click the Attachments tab.

Step 4. Click Generate Token. Once the token is generated it is displayed next
to the Generate Token button.

Note: The username is always the SR number. The terms password and token refer
to the upload token, which is used as a password when prompted by CXD.

USING THE API

Customers utilizing the API can retrieve the token programmatically using the
Get Token API.

Note: An Okta Auth Token is required to call Cisco Get Token API. For details on
obtaining an Auth Token, consult the Cisco ServiceGrid documentation.

HTTP Method: POST

URL: https://cxd-token.cxapps.cisco.com/cxd/token/<SR_Number>

Header:

Table 3. Get Token API Header

Key Type Value
Content-Type
String
application/json
Authorization
String
Bearer <Auth Token>

Body:

Table 4. ServiceGrid GetUploadCredentials API Body

Key Type Value
username
String
Cisco.com username authorized to perform a file upload to the SR
email
String (Email Format)
Email address of the cisco.com username


UPLOADING FILES TO CXD

USING DESKTOP CLIENTS

In general, all the user needs to do is use a client, depending on the protocol,
to connect to cxd.cisco.com, authenticate using the SR number as the username
and the upload token as the password, and eventually upload a file. Depending on
the protocol and the client, the user steps can be different. It is always
recommended to refer to the client documentation for more details.

DIRECTLY FROM A CISCO DEVICE

All Cisco devices have built-in file transfer clients, usually utilized using a
copy or redirect command. Cisco equipment running on a Linux distribution
usually supports one or more of scp, sftp, and curl for SCP, SFTP, and HTTPS
integrations.

FILE UPLOAD API

The file upload API utilizes the HTTP PUT verb to upload files to CXD. For
maximum compatibility and simplicity of integration, the API is kept simple.

HTTP Method: PUT

URL: https://cxd.cisco.com/home/<destination file name>

Headers:

Table 5. CXD File Upload API Headers

Key Type Value
Authorization
String
Basic HTTP Auth String

The body is the file data itself. There are no fields or forms here, which makes
the request very simple.

SAMPLE PYTHON CODE TO USE THE PUT API

Note that the code assumes that the file is stored in the same path you are
running it from.

import requests
from requests.auth import HTTPBasicAuth

username = 'SR Number'
password = 'Upload Token'
auth = HTTPBasicAuth(username, password)

filename = 'showtech.txt'  # Destination filename
url = f'https://cxd.cisco.com/home/{filename}'

headers = {"Expect": "100-continue"}

file_path = 'Local Path to the File'

with open(file_path, 'rb') as f:
    r = requests.put(url + filename, f, auth=auth, headers=headers)
    if r.status_code == 201:
        print("File Uploaded Successfully")

Return to Top


EMAIL FILE ATTACHMENT UPLOADS

If SCM and CXD do not work for you, another alternate file upload method is
email file attachment upload. Note that this method is fundamentally insecure
and does not encrypt the file or the communication session used to transport the
file between the customer and Cisco. It is incumbent upon the customer to
explicitly encrypt files before the files are uploaded through email file
attachments. As an additional security best practice, any sensitive information
such as passwords need to be obfuscated or removed from any configuration file
or log that is sent over an insecure channel. For more information, see
Encrypting Files.

After the files are encrypted, upload additional information and files to the
case by sending the information via an email message to attach@cisco.com with
the case number in the subject line of the message, for example, subject = Case
xxxxxxxxx.

Attachments are limited to 20 MB per email update. Attachments submitted by
using email messages are not encrypted in transit, but are immediately linked to
the specified case and stored in an encrypted format.

Attach the file to an email message and send the message to attach@cisco.com as
shown in this screenshot.



The previous screenshot displays a Microsoft Outlook email that has an encrypted
ZIP file attachment, the correct To address, and a properly formatted Subject.
Other email clients need to provide the same functionality and perform just as
well as Microsoft Outlook.

Return to Top


ENCRYPTING FILES

The following examples show how to encrypt files by using three of the many
available options such as WinZip, Linux tar and openssl commands, and Linux Gzip
and GnuPG. A strong encryption cipher such as AES-128 needs to be used in order
to properly protect the data. If you are using ZIP, an application that supports
AES encryption must be used. Older versions of ZIP applications support a
symmetric encryption system that is not secure and is not to be used.


ENCRYPTING FILES USING WINZIP

This section demonstrates how to encrypt files by using the WinZip application.
Other applications provide the same functionality and perform as well as WinZip.

Step 1. Create a ZIP archive file. In the WinZip GUI, click New and follow the
menu prompts in order to create an appropriately named, new ZIP archive file.
The system displays the newly created ZIP archive file.



Step 2. Add the file(s) to be uploaded to the ZIP archive file and check the
Encrypt added files check box. From the main WinZip window, click Add and then
choose the file(s) to upload. The Encrypt added files check box must be checked.



Step 3. Encrypt the file by using the AES encryption cipher and a strong
password:

 1. Click Add in the file selection window in order to open the Encrypt window.
 2. In the Encrypt window, create an appropriately strong password. The password
    is shared with the case Customer Support Engineer owner, as discussed in
    Communicating the Password to the TAC Customer Support Engineer.
 3. Choose one of the AES Encryption methods.
 4. Click OK in order to encrypt the file(s) and display the main WinZip window.



Step 4. Verify that the file is encrypted. Encrypted files are marked with an
asterisk following the file name or a lock icon in the Encryption column.




ENCRYPTING FILES USING TAR AND OPENSSL

This section shows how to encrypt files by using the Linux command-line tar and
openssl commands. Other archive and encryption commands provide the same
functionality and perform just as well under Linux or Unix.

Step 1. Create a tar archive of the file and encrypt it through OpenSSL using
the AES cipher and a strong password as demonstrated in the following example.
The command output shows the combined tar and openssl command syntax to encrypt
the file(s) using the AES cipher.

[user@linux ~]$ tar cvzf - Data_for_TAC.dat | openssl aes-128-cbc -k
Str0ng_passWo5D | 
      dd of=Data_for_TAC.aes128 Data_for_TAC.dat
60+1 records in
60+1 records out


ENCRYPTING FILES USING GZIP AND GNUPG

This section demonstrates how to encrypt files by using the Linux command-line
Gzip and GnuPG commands. Other archive and encryption commands provide the same
functionality and perform just as well under Linux or Unix. The command output
shows how to use the gzip and gpg command syntax to encrypt the file(s) using
the AES cipher.

Step 1. Compress the file by using Gzip:

[user@linux ~]$ gzip -9 Data_for_TAC.dat

Step 2. Encrypt the file through GnuPG using the AES cipher and a strong
password:

user@linux ~]$ gpg –cipher-algo AES –armor –output Data_for_TAC.dat.gz.asc –symmetric Data_for_TAC.dat.gz

Step 3. Enter and confirm the strong password at the passphrase prompt:

Enter passphrase:
Repeat passphrase:

Return to Top


COMMUNICATING THE PASSWORD TO THE TAC CUSTOMER SUPPORT ENGINEER

When encrypting attachments, share the encrypting password with the case
Customer Support Engineer owner. As a best practice, use a method other than the
one used to upload the file. If you used an email message or FTPS to upload the
file, communicate the password out-of-band such as by telephone or SCM case
update.

Return to Top


CUSTOMER CASE ATTACHMENTS DATA MANAGEMENT

Files uploaded to the TAC FTP folder are managed in accordance with Cisco’s
policies. Documentation regarding data controls and retention can be found in
the TAC Privacy Data Sheet.

Return to Top


SUMMARY

Multiple options exist for uploading information to TAC to help them resolve
cases. SCM and Cisco’s HTML5 Upload tool both offer secure uploads through a
browser, while the CXD offers uploads through a browser, Web API, and multiple
protocols that are supported by different types of clients and Cisco devices.

If you cannot use SCM, Cisco HTML 5 File Upload Tool, or a protocol supported by
CXD that is not FTP as your file upload method, the least preferred file upload
options are FTP, using CXD, or an email message sent to attach@cisco.com. If you
use either of these options, it is strongly advised that you encrypt your files
before transit. For more information, see Encrypting Files. You need to employ a
strong password and communicate the password to the case Customer Support
Engineer out-of-band such as by telephone or SCM case update.

For the duration that a case is open and for a period up to 18 months following
final closure of a case, all files are instantly accessible from within the case
tracking system to authorized Cisco personnel.

 * After 18 months the files can be moved to archival storage.
 * At any time, an authorized customer contact can expressly request that a
   specific file be purged from a case.
 * Files in the FTP folder are retained for only four days.

Return to Top


ADDITIONAL INFORMATION

 * Accessing Cisco Technical Services
 * Cisco Worldwide Support Contacts
 * Cisco Technical Services Resource Guide
 * Cisco Conferencing Products
 * The GNU Privacy Guard
 * The OpenSSL Project
 * WinZip

This document is part of the Cisco Security Research & Operations.

This document is provided on an "as is" basis and does not imply any kind of
guarantee or warranty, including the warranties of merchantability or fitness
for a particular use. Your use of the information on the document or materials
linked from the document is at your own risk. Cisco reserves the right to change
or update this document at any time.

Return to Top


REVISION HISTORY

Revision Publish Date Comments
3.0
12-Apr-2024
Removed the Customer File Retention section and added the Customer Case
Attachments Data Management section.
2.0
01-Nov-2023
Removed the Case File Uploader section and updated the Customer eXperience Drive
section.
1.0
14-Nov-2017
Initial Release


WAS THIS DOCUMENT HELPFUL?

Yes No Feedback



CONTACT CISCO

 * Open a Support Case
 * (Requires a Cisco Service Contract)





Cookies allow us to optimise your use of our website. We also use third-party
cookies for advertising and analytics. Please read our Privacy Statement and
Cookie Notice for more information.
Manage cookie settings Reject Accept



CONSENT MANAGER



Your Opt Out Preference Signal is Honored


 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * TARGETING COOKIES


 * FUNCTIONAL COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. From the list on
left, please choose whether this site may use Performance and/or Targeting
Cookies. By selecting Strictly Necessary Cookies only, you are requesting Cisco
not to sell or share your personal data. Note, blocking some types of cookies
may impact your experience on the site and the services we are able to offer.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies


These cookies provide metrics related to the performance and usability of our
site. They are primarily focused on gathering information about how you interact
with our site, including: page load times, response times, error messages, and
allowing a replay of a visitor’s interactions with our site, which enables us to
review and analyze visitor behavior, helping to improve site usability and
functionality. These cookies also allow us to count visits and traffic sources
so we can measure and improve the performance of our site. They help us to know
which pages are the most and least popular and see how visitors move around the
site. If you do not allow these cookies we will not know when you have visited
our site and will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Save Settings
Allow All