<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS plus psk encryption in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037856#M1067145</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/868128"&gt;@JerryLarson7922&lt;/a&gt;&amp;nbsp;nice find! Thanks for sharing.&lt;/P&gt;</description>
    <pubDate>Sat, 29 Feb 2020 02:51:24 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-02-29T02:51:24Z</dc:date>
    <item>
      <title>TACACS plus psk encryption</title>
      <link>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037095#M1067105</link>
      <description>&lt;P&gt;We are trying to convert or move away from our level TACACS+ 7 psk to a stronger encryption method. We have been searching documents and have not come up with an answer. we are testing this on Cisco cat 9300 switches. Can anybody shed light on this for us on the 9300 platform?&lt;/P&gt;&lt;P&gt;thanks,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 19:54:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037095#M1067105</guid>
      <dc:creator>JerryLarson7922</dc:creator>
      <dc:date>2020-02-27T19:54:27Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS plus psk encryption</title>
      <link>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037292#M1067115</link>
      <description>&lt;P&gt;As far as I can tell it's not currently an option on the Catalyst 9300 series as of the latest 17.1 (Amsterdam train) software.&lt;/P&gt;
&lt;P&gt;Reference:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/17-1/command_reference/b_171_9300_cr/security_commands.html#wp3900897971" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/17-1/command_reference/b_171_9300_cr/security_commands.html#wp3900897971&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Other switches do support it. For example, the Catalyst 3650 with IOS-XE 15.4(1)T or later:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/d1/sec-d1-xe-3se-3650-cr-book/sec-d1-xe-3se-3850-cr-book_chapter_0111.html#wp2111876750" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/d1/sec-d1-xe-3se-3650-cr-book/sec-d1-xe-3se-3850-cr-book_chapter_0111.html#wp2111876750&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The Cisco feature navigator tool does not return any results for this specific feature:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cfn.cloudapps.cisco.com/ITDIT/CFN/jsp/by-feature-technology.jsp" target="_blank"&gt;https://cfn.cloudapps.cisco.com/ITDIT/CFN/jsp/by-feature-technology.jsp&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;(searched by both "TACACS" and "AES")&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 04:24:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037292#M1067115</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-02-28T04:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS plus psk encryption</title>
      <link>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037680#M1067135</link>
      <description>&lt;P&gt;Hello Marvin ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your response. My network engineer kept searching yesterday and found the following.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(config)#key config-key password-encryption (master key)&lt;BR /&gt;(config)#password encryption aes&lt;BR /&gt;(config)#tacacs server (server)&lt;BR /&gt;(config-server-tacacs)#key (key)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh run&amp;nbsp;&lt;/P&gt;&lt;P&gt;(TACACS)&lt;/P&gt;&lt;P&gt;tacacs server server name&amp;nbsp;&lt;BR /&gt;address ipv4 server IP&lt;/P&gt;&lt;P&gt;key 6 XXXXXXXXXXXXXXXXXXXXXXXXXX ( i made all x's&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/why-you-should-be-using-scrypt-for-cisco-router-password-storage/ta-p/3157196" target="_blank"&gt;https://community.cisco.com/t5/security-documents/why-you-should-be-using-scrypt-for-cisco-router-password-storage/ta-p/3157196&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 19:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037680#M1067135</guid>
      <dc:creator>JerryLarson7922</dc:creator>
      <dc:date>2020-02-28T19:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS plus psk encryption</title>
      <link>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037856#M1067145</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/868128"&gt;@JerryLarson7922&lt;/a&gt;&amp;nbsp;nice find! Thanks for sharing.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Feb 2020 02:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037856#M1067145</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-02-29T02:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS plus psk encryption</title>
      <link>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037989#M1067161</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; That's a beautiful solution, but be aware of the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - the configured key is NOT stored in the configuration, you just need to remember it, or if you forget it, delete the old one (meantime services will no longer work, cause the clear-text key cannot be decrypted) and add a new one&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - there used to be many bugs with this feature, where the device will somehow loose the key after a reboot, thus breaking the services making use of the encrypted keys; use a stable IOS version to avoid such issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Feb 2020 14:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tacacs-plus-psk-encryption/m-p/4037989#M1067161</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-02-29T14:57:48Z</dc:date>
    </item>
  </channel>
</rss>

