cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Announcements
Announcements
Choose one of the topics below to view our ISE Resources to help you on your journey with ISE

This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC! We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.

1066
Views
0
Helpful
3
Replies
Highlighted
Cisco Employee

Decrypt backup file using GPG keychain

How to decrypt an ACS backup file (.gpg.tar) using GPG keychain software? I tried decrypting the ISE backup file and it was successful, however decrypting ACS back up failed.

1 ACCEPTED SOLUTION

Accepted Solutions
VIP Advocate

Re: Decrypt backup file using GPG keychain

It just occurred to me that ACS doesn't allow you to specify an encryption key.  Therefore you won't stand a chance to decode this file.  Only the ACS config restore function will be able to decrypt it.

ISE is a bit friendlier in that respect because we are forced to chose an encryption key which we then use going forward.

View solution in original post

3 REPLIES 3
VIP Advocate

Re: Decrypt backup file using GPG keychain

Have you tried this command on a Linux command line?

gpg -v --batch --yes --passphrase myEncryptionKey -d somefile.tar.gpg > somefile.tar

You need to know the key which was used to encrypt the file - myEncryptionKey

Input filename - somefile.tar.gpg

Output filename - somefile.tar

Cisco Employee

Re: Decrypt backup file using GPG keychain

Hi Arne,

I tried the command you provided, but it did not work for ACS however it worked for ISE backup.

VIP Advocate

Re: Decrypt backup file using GPG keychain

It just occurred to me that ACS doesn't allow you to specify an encryption key.  Therefore you won't stand a chance to decode this file.  Only the ACS config restore function will be able to decrypt it.

ISE is a bit friendlier in that respect because we are forced to chose an encryption key which we then use going forward.

View solution in original post