<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Setting up SSH user with encrypted password in Switching</title>
    <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590871#M521950</link>
    <description>&lt;P&gt;0 is clear, you need to use anything above like you said 7 to encrypt, check below one help better :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learningnetwork.cisco.com/s/article/cisco-routers-password-types" target="_blank"&gt;https://learningnetwork.cisco.com/s/article/cisco-routers-password-types&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Apr 2022 11:53:57 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2022-04-12T11:53:57Z</dc:date>
    <item>
      <title>Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590795#M521937</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've already got SSH access configured on my 9200L and it gave me a prompt for an admin user straight after when trying to login, however I didn't know the password. I've since created a user&amp;nbsp;(config)#username XXX password XXX however this appears in unencrypted format. I've tried different command options to encrypt password but these either give an ambiguous error or encrypt everything after the password prompt.&lt;/P&gt;&lt;P&gt;I've read another thread on here saying to use secret instead of password command but the SSH prompt doesnt allow me to login with the secret and only gives me a password prompt.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am fairly new to this level of programming so I'm probably missing something very obvious or silly, so some help on the matter would be greatly appreciated. I could leave the password in cleartext on the config, but I want to do it properly.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 09:12:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590795#M521937</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-12T09:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590830#M521939</link>
      <description>&lt;P&gt;did you try "service password-encryption"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which 9200 IOS version do you have?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 10:57:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590830#M521939</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-12T10:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590835#M521941</link>
      <description>&lt;P&gt;It's IOS 16.12&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would you integrate command, or is it a separate command you apply to the switch that automatically encrypts all level 0 passwords?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 11:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590835#M521941</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-12T11:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590843#M521942</link>
      <description>&lt;P&gt;The command above should l encrypt all password.&amp;nbsp; Did it work?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 11:21:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590843#M521942</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-12T11:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590853#M521945</link>
      <description>&lt;P&gt;Yes this appears to have worked, sure I tried this before but it didn't work, none the less I am happy it has now. The username password is encrypted to level 7. I think this command may have also encrypted another password that I think was in cleartext level 0 before.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Exactly what affect does applying this command have on any level 0 passwords? Does it simply encrypt any level 0 passwords found to level 7? I've read the level 7 encryption is quite easily crackable, is there any way to apply this command to level 9 instead?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 11:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590853#M521945</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-12T11:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590858#M521946</link>
      <description>&lt;P&gt;This command is as it is, you can´t execute it differently.&lt;/P&gt;&lt;P&gt;What you should do is create your password properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device&amp;gt; enable&lt;BR /&gt;Device# configure terminal&lt;BR /&gt;Device(config)# enable password level 12 example123&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;Device(config)# enable secret 9 $9$sMLBsTFXLnnHTk$0L82&lt;/P&gt;&lt;P&gt;Device(config)# service password-encryption&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 11:42:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590858#M521946</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-12T11:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590869#M521949</link>
      <description>&lt;P&gt;Thanks for your explanation above. I have properly setup enable secret and password to protect access to privilledged exec. What I am trying to setup is a user to login to SSH with as I tried the enable secret with username admin and root and it didn't work.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 11:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590869#M521949</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-12T11:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590871#M521950</link>
      <description>&lt;P&gt;0 is clear, you need to use anything above like you said 7 to encrypt, check below one help better :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learningnetwork.cisco.com/s/article/cisco-routers-password-types" target="_blank"&gt;https://learningnetwork.cisco.com/s/article/cisco-routers-password-types&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 11:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590871#M521950</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-04-12T11:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590881#M521951</link>
      <description>&lt;P&gt;I think I tried to access the above link before and it didnt work properly, im pleased to say this one did. So how would you execute the type 9 password with a username for purposes of logging in to SSH?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 11:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590881#M521951</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-12T11:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590888#M521953</link>
      <description>&lt;P&gt;I've just tried the command mentioned in the link you sent- I skimmed over the bit I needed of course (doh).&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;R1(config)#&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;username [user] algorithm-type scrypt secret [pw]&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This is what I submitted and it appears to have hashed the password to scrypt. Done a show run and the password shows as secret 9 followed by encrypted password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I should be able to do this to the enable password as well yes?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 12:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590888#M521953</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-12T12:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590907#M521956</link>
      <description>&lt;P&gt;Since type 7 password as used for virtual terminal is reversible and easily crackable is it possible to use a higher encryption for this? I'm thinking about a telnet connection into a switch and whilst its not good practice to use it anymore I also dont want to disable it. Is the virtual terminal password left as type 7 since the enable secret can be encrypted to level 12 and you need both anyway?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 12:43:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590907#M521956</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-12T12:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590924#M521958</link>
      <description>&lt;PRE&gt;I should be able to do this to the enable password as well yes?&lt;/PRE&gt;
&lt;P&gt;no&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 13:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590924#M521958</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-04-12T13:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590931#M521959</link>
      <description>&lt;P&gt;So the enable password for virtual terminal can only be encrypted to type 7?&lt;/P&gt;&lt;P&gt;I've been looking at how to disable telnet, from what Ive read enable SSH should automatically disable it but it's not. Could you advise what commands required?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 13:09:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590931#M521959</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-12T13:09:59Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590933#M521960</link>
      <description>&lt;P&gt;Not sure what IOS XE running here&lt;/P&gt;
&lt;P&gt;try :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-11/configuration_guide/sec/b_1611_sec_9500_cg/controlling_switch_access_with_passwords_and_privilege_levels.html#task_rqw_nt3_mgb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-11/configuration_guide/sec/b_1611_sec_9500_cg/controlling_switch_access_with_passwords_and_privilege_levels.html#task_rqw_nt3_mgb&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 13:13:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590933#M521960</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-04-12T13:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590941#M521961</link>
      <description>&lt;P&gt;it's running 16.12&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 13:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4590941#M521961</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-12T13:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4591177#M521985</link>
      <description>&lt;P&gt;There are several parts of this that deserve some comments:&lt;/P&gt;
&lt;P&gt;- when you enable service password encryption it does not change any existing passwords. But will encrypt (certain) passwords as they are configured.&lt;/P&gt;
&lt;P&gt;- there are several references to vty passwords, bear in mind that there are multiple options for passwords used for vty and how they are encrypted.&lt;/P&gt;
&lt;P&gt;= the most simple is the vty line password. This is configured on the vty lines and is used to authenticate remote access sessions. It stops being used if you configure login local on the vty or if you configure aaa new-model.&lt;/P&gt;
&lt;P&gt;= if you configure login local or configure aaa authentication with an option to use local passwords then the device will authenticate attempts for remote access using locally configured user names and passwords. Note that different users might have different types of encryption for their passwords.&lt;/P&gt;
&lt;P&gt;= you can configure aaa authentication to use an authentication server to authenticate attempts for remote access. The type of encryption for these users will depend on the authentication server.&lt;/P&gt;
&lt;P&gt;- when you activate SSH it does not automatically disable telnet access. If you want to use only SSH (no telnet) then on the vty lines configure transport input ssh and this will use SSH and not allow telnet.&lt;/P&gt;
&lt;P&gt;- there are 2 levels of passwords that might be used for remote access. Typically there is a user level password which would grant access to user mode and an enable level password to grant access to privileged mode. Note that there are configuration options in which a user might authenticate once (with the user level password) and then be put directly into privileged mode (without requiring a separate password)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 19:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4591177#M521985</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2022-04-12T19:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4591480#M522031</link>
      <description>&lt;P&gt;Thanks Richard that is very useful. I have some questions back if you don't mind.&lt;/P&gt;&lt;P&gt;Is it considered good practice when SSH access is configured to have telnet disabled, or leave it enabled as an alternative access route even though the traffic would be unencrypted between user and switch? I currently have SSH local user access (i think this is an accurate description) configured and transport ssh configured separately, Both telnet and SSH access work. I've configured username and secret instead of password to allow me to use highest level of encryption available in 16.12 IOS instead of the password type7 which is basically useless given the ease of reverse decryption online. Or is this required by the IOS to be able to decrypt the password?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best practice for accessing the switch via SSH and how would you suggest configuring this? There is a smallish team here and we don't have need for multiple local users, but SSH is a must.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2022 08:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4591480#M522031</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-13T08:42:38Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4591634#M522037</link>
      <description>&lt;P&gt;In my experience it varies from organization to organization whether to disable telnet and enable only SSH. Some like having an alternative that would work if some problem developed with SSH. Others are concerned about the lack of encryption in telnet and have heightened security requirements and disable telnet access. Where is your organization on this continuum?&lt;/P&gt;
&lt;P&gt;I am wondering about this statement "transport ssh configured separately, Both telnet and SSH access work." Am I correct in understanding that you have configured transport input ssh (for some of the vty) and that telnet still works? For historical reasons Cisco divides vty lines into 2 groups (0 through 4 and others). If you configure transport input ssh on vty 0 4 but not on the other vty lines then telnet would still work. If you want telnet disabled then you need to do that on all the vty lines.&lt;/P&gt;
&lt;P&gt;You say " I've configured username and secret instead of password to allow me to use highest level of encryption available in 16.12 IOS" But in a previous response you say that you have created a user with type 9 encrypted password. So user name secret is not the highest level of encryption available.&lt;/P&gt;
&lt;P&gt;You ask "What is the best practice for accessing the switch via SSH" To answer this we would need a better understanding of the level of concern in your organization about security on the network. Multiple user accounts configured on the device is ok if security concerns are not so high. If security concerns are high then you should enable aaa for authentication (and perhaps authorization) and use an authentication server (Tacacs or Radius), have a single local user name and password (to be used if there are problems.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2022 10:38:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4591634#M522037</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2022-04-13T10:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4591830#M522047</link>
      <description>&lt;P&gt;So currently we use telnet which I know is not good practice because of the lack of transport encryption. I am using SSH going forward but wasn't if there was set good practice as to whether telnet is left as an alternative if disabled for security. If it more so dependent on the organizations requirements I will make a decision internally on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had noticed there were two groups for vty lines, which i was a bit confused about, but yes you are correct with your understanding- transport ssh is set on one group but not the other. Would I just set transport ssh on both groups or is there a way to disable/ remove the one group? I can get to all my switch stacks easily enough to use serial as a backup connection so i have no particular need to leave to telnet enabled even as a backup line.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What are the highest levels of encryption readily available for secret or password? I was under the impression from&amp;nbsp;&lt;A href="https://learningnetwork.cisco.com/s/article/cisco-routers-password-types" target="_blank"&gt;https://learningnetwork.cisco.com/s/article/cisco-routers-password-types&lt;/A&gt;&amp;nbsp;that type 9 was the highest level.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where different users and passwords are concerned and choice of use, security is a big concern for us as would be for any organization, but we're not Bank of England either... So a healthy level of security where we might have a single user for ssh access and also the privileged access. How would you suggest implementing this?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2022 12:39:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4591830#M522047</guid>
      <dc:creator>athomas1</dc:creator>
      <dc:date>2022-04-13T12:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SSH user with encrypted password</title>
      <link>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4593707#M522177</link>
      <description>&lt;P&gt;From a security perspective certainly SSH is better than telnet. Whether telnet is tolerated and used as a secondary choice for access or is treated as a potential threat and disabled depends on the security environment of the organization. I do not know about your organization but I am guessing that you may want to disable telnet and use only SSH.&lt;/P&gt;
&lt;P&gt;In the early days of IOS the vty ports were 0 to 4. Then Cisco added support for additional vty. I assume that it was to provide compatibility with older versions but 0 4 has always been separate from 5 15 (or whatever number of vty that you might have). I do not believe that there is any way to eliminate either group. If you wanted to disable one group (or disable some ports in a group) you could configure those vty with transport input none.&lt;/P&gt;
&lt;P&gt;If you or your organization are concerned about security of passwords etc then my suggestion would be to transition away from locally configured user and password and implement an authentication server (Tacacs or Radius). Leave one user and password in the configuration to be used for access if there are problems with the authentication server.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2022 20:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/setting-up-ssh-user-with-encrypted-password/m-p/4593707#M522177</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2022-04-15T20:05:41Z</dc:date>
    </item>
  </channel>
</rss>

