<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IOS import AES keys in Routing</title>
    <link>https://community.cisco.com/t5/routing/ios-import-aes-keys/m-p/5206315#M404799</link>
    <description>&lt;P&gt;Hello Community.&lt;/P&gt;
&lt;P&gt;I would like to establish&amp;nbsp;Certificate-based SIP-trunk to WxC. When&amp;nbsp;tried to import crypto key generated outside router&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;crypto key import rsa ownKEY general-purpose exportable terminal p@ssword&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;there is a problem. Only 3DES ecrypted password is accepted. No AES, no unencrypted only 3DES.&lt;/P&gt;
&lt;P&gt;Other thing is that debug do not shows it in clear alert but some numbers like -1 or 11.&lt;/P&gt;
&lt;P&gt;Next thing that key export allows to AES key encryption but You are not able to import it back.&lt;/P&gt;
&lt;P&gt;So in 2024 it should be shame that Cisco accept only weak algorithm.&lt;/P&gt;
&lt;P&gt;Tested on&amp;nbsp;Virtual XE Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 17.9.4a&lt;/P&gt;
&lt;P&gt;Regards&lt;BR /&gt;Hermozol&lt;/P&gt;</description>
    <pubDate>Thu, 10 Oct 2024 07:41:54 GMT</pubDate>
    <dc:creator>Hermozol</dc:creator>
    <dc:date>2024-10-10T07:41:54Z</dc:date>
    <item>
      <title>IOS import AES keys</title>
      <link>https://community.cisco.com/t5/routing/ios-import-aes-keys/m-p/5206315#M404799</link>
      <description>&lt;P&gt;Hello Community.&lt;/P&gt;
&lt;P&gt;I would like to establish&amp;nbsp;Certificate-based SIP-trunk to WxC. When&amp;nbsp;tried to import crypto key generated outside router&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;crypto key import rsa ownKEY general-purpose exportable terminal p@ssword&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;there is a problem. Only 3DES ecrypted password is accepted. No AES, no unencrypted only 3DES.&lt;/P&gt;
&lt;P&gt;Other thing is that debug do not shows it in clear alert but some numbers like -1 or 11.&lt;/P&gt;
&lt;P&gt;Next thing that key export allows to AES key encryption but You are not able to import it back.&lt;/P&gt;
&lt;P&gt;So in 2024 it should be shame that Cisco accept only weak algorithm.&lt;/P&gt;
&lt;P&gt;Tested on&amp;nbsp;Virtual XE Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 17.9.4a&lt;/P&gt;
&lt;P&gt;Regards&lt;BR /&gt;Hermozol&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 07:41:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing/ios-import-aes-keys/m-p/5206315#M404799</guid>
      <dc:creator>Hermozol</dc:creator>
      <dc:date>2024-10-10T07:41:54Z</dc:date>
    </item>
  </channel>
</rss>

