Changing Pre-share Keys with Prime using Templates??
I'm trying to use the Cisco Prime 3.2 Configuration Templates in the Features & Technologies-Security-VPN Components-Pre-shared keys to change existing pre-share keys on multipule IPsec/GRE Tunnels.
I add the peer IP and subnet mask, then it ask for the pre-share key twice. When I type the pre-share in, it does not show up, however I then save and when I look at the CLI commands that will be deployed, it shows a "NO" for the exiting pre-share keys and peers, and then the new one but with all ***** (asterix) I deploy anyway, however the key just shows up as * (asterix) in the router's configuration, and even though I match the key on both sides, when I clear the security associates the tunnel breaks.
I am assuming that from within Cisco Prime the pre-share key I enter is not getting encrypted correctly or at all either before or after I deploy to the router.
Anyone have any ideas or experience with this to make it work. Is Cisco Prime expecting that I am enter an already existing encrypted pre-share or is it suppose to except clear text key and encrypted it or let the router encrypt it?
Inviting all network professionals in operations! We'd like to understand what would be valuable for you in a mobile application. Your response will help Cisco improve a product feature that could benefit you. Thanks!
Click here to take the sur...
Cisco’s software-defined wide area network (SD-WAN) solution allows user to quickly and seamlessly establish an overlay fabric to connect an enterprise’s data centers, branch and campus locations, as well as colocation facilities in order to imp...
1. Log into CLI of DNAC:
ssh maglev@< DNAC appliance IP> -p 2222
2. Run this curl command to get token to get member id:
curl -X POST -u admin:<admin user password> -H -V https://<CLUSTER-IP>/api/system/v1/identitymgmt/token
Enterprise Switching Business Unit is glad to announce Beta release 16.12.2 for all Catalyst 9200/9300/9400/9500/9600 and Catalyst 3650/3850 Platforms. This release is made available to allow users to test, evaluate and share fee...
Purpose of the document
This document describes the general recommendations or best practices when designing and deploying the Cisco SD-Access technology. The document assumes that the reader has a general overview of Cisco's SD-Access for Distributed C...