<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Protected Access Credential (PAC) and TrustSec in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263918#M595152</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp;So is the PAC shared key (instead of RADIUS shared key), which is configured on the switch, used to encrypt this initial communication between A-ID and I-ID when the PAC-Random, PAC-Opaque, and A-ID info is being exchanged between them? The PAC-Random is used in later stages as some kind of session key?&lt;/P&gt;</description>
    <pubDate>Sun, 23 Feb 2025 10:59:28 GMT</pubDate>
    <dc:creator>iores</dc:creator>
    <dc:date>2025-02-23T10:59:28Z</dc:date>
    <item>
      <title>Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263847#M595143</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am little confused how PAC works.&lt;/P&gt;&lt;P&gt;With TrustSec, a PAC key is manually configured on the switch instead of the RADIUS key.&lt;/P&gt;&lt;P&gt;By looking at how PAC works, it seems that ISE generates PAC Random Key, PAC-Opaque and A-ID. This all together is called PAC and it is then sent to the switch.&lt;/P&gt;&lt;P&gt;Why now two PAC keys? When is the first key used then? Is it used maybe do encrypt the newly generated PAC sent from ISE to the switch?&lt;/P&gt;&lt;P&gt;Is the second PAC key used as some kind of session key which switch uses to encrypt the PAC-Opaque when sent back to ISE?&lt;/P&gt;&lt;P&gt;What am I missing?&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 22:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263847#M595143</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2025-02-22T22:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263859#M595144</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1287614"&gt;@iores&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They both have PAC due the mutual authentication and the server will not share it PAC. This similar to the concept of public and private key used in certificate authentication.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAC Overview&lt;BR /&gt; The PAC is a unique shared credential used to mutually&lt;BR /&gt;authenticate the client and server. It is associated with a specific&lt;BR /&gt;client username and a server authority identifier (A-ID). A PAC&lt;BR /&gt;removes the need for Public Key Infrastructure (PKI) and digital&lt;BR /&gt;certificates.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/td/docs/switches/lan/catalyst3850/software/release/16-2/workflows/Cisco_trustsec_feature_guide.pdf" target="_blank"&gt;https://www.cisco.com/c/dam/en/us/td/docs/switches/lan/catalyst3850/software/release/16-2/workflows/Cisco_trustsec_feature_guide.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 23:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263859#M595144</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2025-02-22T23:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263860#M595145</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp;Why does the server create PAC Random key for each client?&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 23:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263860#M595145</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2025-02-22T23:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263865#M595146</link>
      <description>&lt;P&gt;&amp;nbsp; It would be similar to a private x public key concept in PKI infrasctructure.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Server A-ID maintains a local key (master key) that is only known by&lt;BR /&gt;the server.&lt;BR /&gt;2. When a client, which is referred to in this context as an initiator&lt;BR /&gt;identity (I-ID), requests a PAC from the server, the server generates a&lt;BR /&gt;randomly unique PAC key and PAC-Opaque field for this client.&lt;BR /&gt;3. The PAC-Opaque field contains the randomly generated PAC key along&lt;BR /&gt;with other information such as an I-ID and key lifetime.&lt;BR /&gt;4. PAC Key, I-ID, and Lifetime in the PAC-Opaque field are encrypted with&lt;BR /&gt;the master key.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 23:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263865#M595146</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2025-02-22T23:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263867#M595147</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp;And this (PAC random key, PAC-Opaque, A-ID) is sent to I-ID? Server then forgets everything about this PAC. When the client or I-ID sends the PAC-Opaque again to server, the server uses the master key to decrypt and validate the content of the PAC-Opaque field?&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 23:50:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263867#M595147</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2025-02-22T23:50:37Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263868#M595148</link>
      <description>&lt;P&gt;Correct.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 00:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263868#M595148</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2025-02-23T00:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263918#M595152</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp;So is the PAC shared key (instead of RADIUS shared key), which is configured on the switch, used to encrypt this initial communication between A-ID and I-ID when the PAC-Random, PAC-Opaque, and A-ID info is being exchanged between them? The PAC-Random is used in later stages as some kind of session key?&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 10:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263918#M595152</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2025-02-23T10:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263939#M595153</link>
      <description>&lt;P&gt;Not exactly. PAC process is a mutual authentication prior to EAP-FAST be stablished. Once PAC accomplish its goal it will not be used anymore.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; I would interpreter the&amp;nbsp;&lt;SPAN&gt;PAC-Random and&amp;nbsp; PAC-Opaque more like a public key. Based, for example, on this description&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"The PAC-Opaque field format and contents are specific to the PAC server on which it is issued. The RADIUS server obtains the PAC Key from the PAC-Opaque field and derives the shared secret the same way clients do. Secure RADIUS only modifies the way shared secret is derived and not its usage."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You probably already heard the famous store about Alice and Bob in cryptography, dont you?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Alice wants to send a message to Bob but she suspicious&amp;nbsp; that the&amp;nbsp; postman is reading her messages. So, she decided to put the pessages inside a box with locker. However, Bob does not have the key to open the locker and read the message! How does Alice overcome this problem?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Alice send a copy of the key to Bob. The postman will see the key but it will not mean anything to him. The key is delivered.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now Alice and Bob have a key that opens the locker.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Later, Alice send a message to Bob inside a box and lock the box with the locker. Ship the box to Bob.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The postman see the box but it is locked. Then, he hand the box to Bob and can´t see the message.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Bob receive the box and he has the key to open the locker because Alice send to him the key previously.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now they can exchange messages securely&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 12:39:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263939#M595153</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2025-02-23T12:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263982#M595154</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp;So why do we need to configure PAC key on switch? What it is used for? How exactly mutual authentication happens between the switch and the server? What part of PAC switch presents to server, and which server to the switch?&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 15:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263982#M595154</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2025-02-23T15:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263996#M595155</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1287614"&gt;@iores&lt;/a&gt;&amp;nbsp; I am not sure I will be able to explain to you.&lt;/P&gt;
&lt;P&gt;"&lt;SPAN&gt;The RADIUS server obtains the PAC Key from the PAC-Opaque field and derives the shared secret the &lt;STRONG&gt;same way clients do&lt;/STRONG&gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The client, the switch on this case, need to follow the same process because is a mutual process.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 16:31:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5263996#M595155</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2025-02-23T16:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264045#M595160</link>
      <description>&lt;P&gt;I tend to zone out when I read discussions about how PAC works and why we even have it.&amp;nbsp; I have yet to find a sensible discussion about this topic, and also a pragmatic approach to using PAC, or even what the risks are by NOT using PAC. Here are some key points that I think don't get discussed:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Admins don't choose to use PAC for their RADIUS key obfuscation - it's most likely there because Network Devices have been provisioned by DNAC.&amp;nbsp; DNAC will push this config to your Catalysts, whether you like it or not. I personally don't like it - see point 2&lt;/LI&gt;
&lt;LI&gt;PAC mechanism requires EAP-FAST.&amp;nbsp; PAC implements TLS 1.0 during the EAP-FAST tunnel establishment.&amp;nbsp; That alone sets us back 10 years in security terms because we want to get rid of TLS 1.0 - it means I cannot disable TLS 1.0 in my ISE deployment.&lt;/LI&gt;
&lt;LI&gt;When the PAC/CTS mechanism fails (and it happens randomly with IOS versions) then you are flooded with errors and have to sort out that mess. DNAC offers no help in this effort.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My advice.&amp;nbsp; If you don't provision devices with DNAC, then don't use PAC unless you want to manage all this stuff on top of everything else.&amp;nbsp; Rather use AES to create Type 6 RADIUS keys(and keep your AES passphrase safe in your Password Manager). Type 6 is the best you can do for TACACS/RADIUS - you can't use Type 8/9 because these aren't reversible in software (required for RADIUS/TACACS).&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;password encryption aes&lt;/LI-CODE&gt;
&lt;P&gt;If security is of utmost concern, then use DTLS to secure your RADIUS traffic.&lt;/P&gt;
&lt;P&gt;If you're using DNAC and have devices provisioned with PAC, and you want to run a network without TLS 1.0 - then you need ISE 3.4 which supports PAC-less provisioning, as well as IOS-XE 17.15+ - sadly, DNAC has not yet come to the party. But it's a good sign that even Cisco recognises this pain. How does one migrate all the network devices away from TLS 1.0/PAC mess?&amp;nbsp; That remains to be seen - hopefully future versions of DNAC will make this a little easier to manage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 21:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264045#M595160</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-02-23T21:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264049#M595163</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp;So you are saying that the PAC Random key, and PAC-Opaque is generated by the client which is then sent to server which then remembers this for every and each of the clients? I did not find any source mentioning this.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 22:19:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264049#M595163</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2025-02-23T22:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264053#M595165</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;I was looking at the configuration guide for TrustSec, not necessarily under the DNA C. I cannot understand exactly what is the purpose of manually entered shared key (PAC) on the switch, and what is the purpose of the provisioned one which is received from the server/ISE. In addition, I don't understand how exactly are client and server mutually authenticated via PAC.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 22:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264053#M595165</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2025-02-23T22:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264098#M595169</link>
      <description>&lt;P&gt;you should not have to enter and PAC stuff on a switch.&amp;nbsp; If you have ISE, you can add a PAC username and password into the Network Device TrustSec section, click save. And then on the IOS device that is CTS enabled to ISE, you issue a command to refresh the PAC. That sorts it out. Using TLS 1.0 and EAP-FAST etc.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 04:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264098#M595169</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-02-24T04:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264356#M595182</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/trustsec/configuration/guide/trustsec/ident-conn_config.html" target="_self"&gt;Here&lt;/A&gt;&amp;nbsp;(Configuring Credentials and AAA for a Cisco TrustSec Seed Device) it says that PAC shared key shoud be configured on the switch.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 18:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264356#M595182</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2025-02-24T18:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: Protected Access Credential (PAC) and TrustSec</title>
      <link>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264863#M595220</link>
      <description>&lt;P&gt;I'm out of my depth here - don't know enough about CTS sorry. Maybe suggest it on the &lt;A href="https://eurl.io/#ryJFrhiBW" target="_self"&gt;Webex ISE Bar&lt;/A&gt;&amp;nbsp;and ask/chat to Thomas Howard or Charlie Moreton to run a YouTube video on how this stuff really works, and going through some scenarios where it's done manually, and where DNAC is involved.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 22:24:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/protected-access-credential-pac-and-trustsec/m-p/5264863#M595220</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-02-25T22:24:13Z</dc:date>
    </item>
  </channel>
</rss>

