<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic At least it's a config that in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935741#M38626</link>
    <description>&lt;P&gt;At least it's a config that is shown in Cisco best practices and I assume that there is no "hidden gem" to protect these keys better than with type7.&lt;/P&gt;</description>
    <pubDate>Wed, 24 Aug 2016 11:37:53 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2016-08-24T11:37:53Z</dc:date>
    <item>
      <title>Radius Server key</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935737#M38616</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;whenever I specify the key for the radius server it comes type 7 as such below, if I m not wrong type 7 can be decrypted easily&amp;nbsp;how I can use a encryption which cannot be decrypted.&lt;/P&gt;
&lt;P style="margin: 0in 0in 10pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI Light','sans-serif';"&gt;radius server ISE-SERVERS-SEC&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 10pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI Light','sans-serif';"&gt;&amp;nbsp;address ipv4 10.X.X.1 auth-port 1645 acct-port 1646&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 10pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI Light','sans-serif';"&gt;&amp;nbsp;key 7 121608161C0C1E012B3F&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935737#M38616</guid>
      <dc:creator>clark white</dc:creator>
      <dc:date>2019-03-11T07:01:12Z</dc:date>
    </item>
    <item>
      <title>Not all passwords can be</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935738#M38619</link>
      <description>&lt;P&gt;Not all passwords can be protected efficiently. While there are functions in IOS to provide good security for&amp;nbsp;login-passwords and VPN-PSK, I'm not aware of a similar function for RADIUS keys.&lt;/P&gt;
&lt;P&gt;There are still some ways to&amp;nbsp;provide security for your keys:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Never use unencrypted management sessions&amp;nbsp;like Telnet or HTTP. Use SSH and HTTPS instead.&lt;/LI&gt;
&lt;LI&gt;Use SNMPv3 instead of SNMPv2&lt;/LI&gt;
&lt;LI&gt;When backing up your config use SCP instead of TFTP/FTP&lt;/LI&gt;
&lt;LI&gt;use complex keys (you have to decide if "omangreat" is a good key)&lt;/LI&gt;
&lt;LI&gt;use long keys as the length of the shown type 7 output relates to the length of the key/password&lt;/LI&gt;
&lt;LI&gt;make sure there is no one&amp;nbsp;sholdersurfing when working on your config&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 22 Aug 2016 18:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935738#M38619</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-22T18:33:43Z</dc:date>
    </item>
    <item>
      <title>Dear</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935739#M38622</link>
      <description>&lt;P&gt;Dear&lt;/P&gt;
&lt;P&gt;so you are confirming me that when we are configuring the radius host with a key command there is only type 7 key encryption apart from that we have to secure by the ways you have mentioned,&lt;/P&gt;
&lt;P&gt;so my configs are correct I am not doing any mistakes for specifying the keys&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2016 21:30:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935739#M38622</guid>
      <dc:creator>clark white</dc:creator>
      <dc:date>2016-08-22T21:30:47Z</dc:date>
    </item>
    <item>
      <title>Dears,</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935740#M38623</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;Anybody can confirm to me the above .&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2016 11:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935740#M38623</guid>
      <dc:creator>clark white</dc:creator>
      <dc:date>2016-08-24T11:35:08Z</dc:date>
    </item>
    <item>
      <title>At least it's a config that</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935741#M38626</link>
      <description>&lt;P&gt;At least it's a config that is shown in Cisco best practices and I assume that there is no "hidden gem" to protect these keys better than with type7.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2016 11:37:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935741#M38626</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-24T11:37:53Z</dc:date>
    </item>
    <item>
      <title>anybody can help me for my</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935742#M38630</link>
      <description>&lt;P&gt;anybody can help me for my above query and also can confirm to me whether&amp;nbsp; there is another way best practices to configure the radius configuration on the switches.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 20:01:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/2935742#M38630</guid>
      <dc:creator>clark white</dc:creator>
      <dc:date>2016-08-31T20:01:59Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Server key</title>
      <link>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/4605116#M574583</link>
      <description>&lt;P&gt;Use type 6 password if your device supports it. Enter the following in global config and it will convert type 7 passwords to type 6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;! Specify a password you want the system to use to encrypt&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;hostname(config)# key config-key password-encrypt &amp;lt;password&amp;gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;hostname(config)# password encryption aes&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Reference:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&lt;A href="https://media.defense.gov/2022/Feb/17/2002940795/-1/-1/1/CSI_CISCO_PASSWORD_TYPES_BEST_PRACTICES_20220217.PDF" target="_blank"&gt;CSI_CISCO_PASSWORD_TYPES_BEST_PRACTICES_20220217.PDF (defense.gov)&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 05 May 2022 14:23:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/radius-server-key/m-p/4605116#M574583</guid>
      <dc:creator>Eman.Jr</dc:creator>
      <dc:date>2022-05-05T14:23:56Z</dc:date>
    </item>
  </channel>
</rss>

