<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tacacs key encryption in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-key-encryption/m-p/3840208#M548480</link>
    <description>&lt;P&gt;Hello Keith&lt;/P&gt;&lt;P&gt;actually, I have a similar problem recently,&lt;BR /&gt;I do some google and cisco community and seems I found the solution on this and the reason I may not adopt this type6&lt;BR /&gt;1) &lt;STRONG&gt;why I may not try AES 256&lt;/STRONG&gt;&lt;BR /&gt;it seems that AES needs to encrypted by the master key, which means that you cannot just copy the config and pasted to others device.&lt;BR /&gt;so that might be the problem even &lt;EM&gt;enable secret&lt;/EM&gt; is not using type 6 but type 9 for more secure password you can copy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) &lt;STRONG&gt;the implementation&lt;/STRONG&gt;,&lt;/P&gt;&lt;P&gt;seems that using key chain concept by encrypted an AES key before you applied on the tacacs key command&lt;/P&gt;&lt;P&gt;although the example is isakmp, with a reasonable guess the logic is the same I believe.&lt;/P&gt;&lt;P&gt;Enter configuration commands, one per line. End with CNTL/Z.&lt;BR /&gt;Router(config)#key config-key password-encrypt testkey123&lt;BR /&gt;Router(config)#password encryption aes&lt;BR /&gt;Router(config)#^Z&lt;BR /&gt;Router#&lt;BR /&gt;Router#show running-config&lt;BR /&gt;Building configuration...&lt;BR /&gt;.....&lt;BR /&gt;password encryption aes&lt;BR /&gt;...&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;crypto isakmp key 6 FLgBaJHXdYY_AcHZZMgQ_RhTDJXHUBAAB address 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/46420-pre-sh-keys-ios-rtr-cfg.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/46420-pre-sh-keys-ios-rtr-cfg.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/why-you-should-be-using-scrypt-for-cisco-router-password-storage/ta-p/3157196" target="_blank"&gt;https://community.cisco.com/t5/security-documents/why-you-should-be-using-scrypt-for-cisco-router-password-storage/ta-p/3157196&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Apr 2019 11:19:48 GMT</pubDate>
    <dc:creator>perkin</dc:creator>
    <dc:date>2019-04-17T11:19:48Z</dc:date>
    <item>
      <title>Tacacs key encryption</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-key-encryption/m-p/3396099#M548478</link>
      <description>&lt;P class="s570a4-10 iEJDri"&gt;I am trying to improve the security of some of our switches, one of the things I want to do is change all the tacacs keys from encryption level from type 7 to type 6 (aes).&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;some of the switches have the option by default for "tacacs-server key 6 password" where as other switches only have option 0 and 7 for encryption level.&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;Even when I enable aes "password encryption aes" and set the aes encryption key "key config-key password-encrypt TestPassword" I still dont get option 6 for my encryption level&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;This is on Version 15.2(4r)E3.&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;I have the same issue with some other catalyst switches as well.&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;can anyone advise if only some firmware versions support this level of encryption or if I'm missing something&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;thanks,&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;Keith&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-key-encryption/m-p/3396099#M548478</guid>
      <dc:creator>keith0001111111</dc:creator>
      <dc:date>2020-02-21T18:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs key encryption</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-key-encryption/m-p/3396102#M548479</link>
      <description>&lt;P&gt;Hi. I also am looking for a workaround for this. Be interested to hear what the community has done with this. Google didn't find anything!&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jun 2018 22:09:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-key-encryption/m-p/3396102#M548479</guid>
      <dc:creator>ashstavegas</dc:creator>
      <dc:date>2018-06-07T22:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs key encryption</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-key-encryption/m-p/3840208#M548480</link>
      <description>&lt;P&gt;Hello Keith&lt;/P&gt;&lt;P&gt;actually, I have a similar problem recently,&lt;BR /&gt;I do some google and cisco community and seems I found the solution on this and the reason I may not adopt this type6&lt;BR /&gt;1) &lt;STRONG&gt;why I may not try AES 256&lt;/STRONG&gt;&lt;BR /&gt;it seems that AES needs to encrypted by the master key, which means that you cannot just copy the config and pasted to others device.&lt;BR /&gt;so that might be the problem even &lt;EM&gt;enable secret&lt;/EM&gt; is not using type 6 but type 9 for more secure password you can copy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) &lt;STRONG&gt;the implementation&lt;/STRONG&gt;,&lt;/P&gt;&lt;P&gt;seems that using key chain concept by encrypted an AES key before you applied on the tacacs key command&lt;/P&gt;&lt;P&gt;although the example is isakmp, with a reasonable guess the logic is the same I believe.&lt;/P&gt;&lt;P&gt;Enter configuration commands, one per line. End with CNTL/Z.&lt;BR /&gt;Router(config)#key config-key password-encrypt testkey123&lt;BR /&gt;Router(config)#password encryption aes&lt;BR /&gt;Router(config)#^Z&lt;BR /&gt;Router#&lt;BR /&gt;Router#show running-config&lt;BR /&gt;Building configuration...&lt;BR /&gt;.....&lt;BR /&gt;password encryption aes&lt;BR /&gt;...&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;crypto isakmp key 6 FLgBaJHXdYY_AcHZZMgQ_RhTDJXHUBAAB address 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/46420-pre-sh-keys-ios-rtr-cfg.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/46420-pre-sh-keys-ios-rtr-cfg.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/why-you-should-be-using-scrypt-for-cisco-router-password-storage/ta-p/3157196" target="_blank"&gt;https://community.cisco.com/t5/security-documents/why-you-should-be-using-scrypt-for-cisco-router-password-storage/ta-p/3157196&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 11:19:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-key-encryption/m-p/3840208#M548480</guid>
      <dc:creator>perkin</dc:creator>
      <dc:date>2019-04-17T11:19:48Z</dc:date>
    </item>
  </channel>
</rss>

