<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOS Password Encryption Algorithm in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-password-encryption-algorithm/m-p/3400750#M902297</link>
    <description>&lt;P&gt;It sounds like, from this question and the other one you posted, that you've been audited or are preparing for an audit. It would be better if you learned some of the fundamentals and best practices rather than asking specific questions out of context.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In any event, ASA passwords since 9.7 can use a stronger pbkdf2 algorithm for hashing local passwords. Details are here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa99/configuration/general/asa-99-general-config/aaa-local.html#ID-2114-00000076" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa99/configuration/general/asa-99-general-config/aaa-local.html#ID-2114-00000076&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IOS devices should be setup to use type 9 (where possible - vs. type 5 or 7) user passwords and "enable secret" passwords. If type 8/9 are not supported on your IOS then type 5 is the next-preferred method.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learningnetwork.cisco.com/thread/86911" target="_blank"&gt;https://learningnetwork.cisco.com/thread/86911&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 17 Jun 2018 07:25:19 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2018-06-17T07:25:19Z</dc:date>
    <item>
      <title>IOS Password Encryption Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ios-password-encryption-algorithm/m-p/3400744#M902235</link>
      <description>&lt;P&gt;I need to implement strong encryption algorithm for Cisco IOS and ASA firewalls. How do I achieve this?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:53:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-password-encryption-algorithm/m-p/3400744#M902235</guid>
      <dc:creator>avilt</dc:creator>
      <dc:date>2020-02-21T15:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Password Encryption Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ios-password-encryption-algorithm/m-p/3400750#M902297</link>
      <description>&lt;P&gt;It sounds like, from this question and the other one you posted, that you've been audited or are preparing for an audit. It would be better if you learned some of the fundamentals and best practices rather than asking specific questions out of context.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In any event, ASA passwords since 9.7 can use a stronger pbkdf2 algorithm for hashing local passwords. Details are here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa99/configuration/general/asa-99-general-config/aaa-local.html#ID-2114-00000076" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa99/configuration/general/asa-99-general-config/aaa-local.html#ID-2114-00000076&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IOS devices should be setup to use type 9 (where possible - vs. type 5 or 7) user passwords and "enable secret" passwords. If type 8/9 are not supported on your IOS then type 5 is the next-preferred method.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learningnetwork.cisco.com/thread/86911" target="_blank"&gt;https://learningnetwork.cisco.com/thread/86911&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jun 2018 07:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-password-encryption-algorithm/m-p/3400750#M902297</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-06-17T07:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Password Encryption Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ios-password-encryption-algorithm/m-p/3400949#M902300</link>
      <description>&lt;P&gt;When I define users on IOS/ASA, is it possible to hide/encrypt the username in the running config?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;username Abc privilege 15 secret 5 $XXXXXXXXXXXXXXXXXXXXXXXXX&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jun 2018 06:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-password-encryption-algorithm/m-p/3400949#M902300</guid>
      <dc:creator>avilt</dc:creator>
      <dc:date>2018-06-18T06:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Password Encryption Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ios-password-encryption-algorithm/m-p/3401074#M902307</link>
      <description>Hi, I don't believe it's possible to hide/encrypt a local user account in the running configuration. &lt;BR /&gt;&lt;BR /&gt;What a lot of organizations do is implement an external aaa server (tacacs+ or radius) which stores the user accounts/passwords in a remote database (therefore not stored on the local router/switch).</description>
      <pubDate>Mon, 18 Jun 2018 12:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-password-encryption-algorithm/m-p/3401074#M902307</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-06-18T12:14:46Z</dc:date>
    </item>
  </channel>
</rss>

