How can I remove the enable secret type 9 and set the number type 5.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-11-2020 09:34 AM - edited 06-11-2020 10:12 AM
I have been trying to remove the enable secret 9 and set the enable secret 5 on Cisco 9300, but after I removed it with the command line " no enable secret" and added the command line " enable secret 5 PASSWORD" and verified with " Show run" the type 9 is still there.
You will wonder why I want to change type 9 to type 5, and the answer is because my authentication is through tacacs-server and when I am logging in this switch, this doesn't accept the password ( Password authentication fail) and this is because of the Type 9 work whit different hashing algorithm (SHA256) and typ5 work with MD5.
Another thing when I added the command line " Enable secret 5 PASSWORD" I receive the warning ( ERROR: The secret you entered is not a valid encrypted secret.To enter an UNENCRYPTED secret, do not specify type 5 encryption. When you properly enter an UNENCRYPTED secret, it will be encrypted). Then again added the command line "enable secret PASSWORD " but in this time without number 5 and when I checked the configuration the level of the enable secret is again 9.
The question is: How can I remove the enable secret 9 and set the number 5.
Thank you in advance.
- Labels:
-
Network Management
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-11-2020 10:11 AM
This tutorial might help you. https://learningnetwork.cisco.com/s/article/cisco-routers-password-types
type your command like: Enable secret PASSWORD
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-11-2020 11:10 AM
Hello Kumar,
Thanks for your response. I saw this tutorial previously, before this post and I did it but the result is the same, the hashing algorithm type 9 is still there.
Thanks,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-11-2020 10:53 AM - edited 06-11-2020 11:01 AM
What's your IOS XE version ? Cisco pushes stronger passwords, type 5 passwords are deprecated. For example, XE Fuji 16.9 Per Cisco Password type 5 is deprecated and must be migrated to stronger password type 8 or type 9.
there might be a setting in IOS where you could force type 5 still
do you have any options after enable ?
different IOS XE version may help you
Regards, ML
**Please Rate All Helpful Responses **
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-11-2020 11:14 AM
Hello Martin,
This is the version.
Cisco IOS XE Software, Version 16.12.02
Cisco IOS Software [Gibraltar], Catalyst L3 Switch Software (CAT9K_IOSXE), Version 16.12.02, RELEASE SOFTWARE (fc2)
cisco C9300-48U
Thanks,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-11-2020 11:42 AM
Hi,
Note: Password type 5 is deprecated. Password type 5 must be migrated to stronger password type 8 or type
9.
The command would be like: enable password [level level] {password encryption-type encrypted-password}
I suggest you visit on page 8 for more information: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3650/software/release/16-12/configuration_guide/sec/b_1612_sec_3650_cg.pdf
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-11-2020 11:52 AM
don;t have access to 9000 switch right now; if i do later, i check for options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-12-2020 12:32 PM
Cisco is making it difficult for you to use the type 5 password in this release. As you discovered when you attempted to do it the command enable secret 5 <some value> then Cisco expects the value that you enter to be the already encrypted word not the plain text word. It seems to me that you might have a solution if you have some other Cisco gear that does still use the type 5 password. If you do have a Cisco router or switch that uses type 5 then configure the password that you want to use, do show run on that device, copy the value of the enable secret (which will be the encrypted version of the password), and use that value for the enable secret 5 on the problem device.
Rick
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-12-2020 01:16 PM
Hello Richard,
Thank you for your assistance,
Your recommendation had already been made, but type 9 still appears. As you indicate like Kumar and Martin, type 5 is deprecated and after several tests, I think that type 9 has nothing to do with the authentication problem that I have, it seems to be something related to AAA and tacacs. I ran an aaa and tacacs debugging and I got the below capture.
Jun 12 18:11:18.829: %PLATFORM_STACKPOWER-3-INVALID_TOPOLOGY: Invalid power stack topology observed by switch 5. More than four switches are connected in ring topology
Jun 12 18:11:27.063: AAA/BIND(0000103E): Bind i/f
Jun 12 18:11:27.063: AAA/AUTHEN/LOGIN (0000103E): Pick method list 'default'
Jun 12 18:11:27.063: TPLUS: Queuing AAA Authentication request 4158 for processing
Jun 12 18:11:27.063: TPLUS(0000103E) login timer started 1020 sec timeout
Jun 12 18:11:27.063: TPLUS: processing authentication start request id 4158
Jun 12 18:11:27.063: TPLUS: Authentication start packet created for 4158(johnc)
Jun 12 18:11:27.063: AAA/AUTHEN/ENABLE(0000103E): Processing request action LOGIN
Jun 12 18:11:27.063: AAA/AUTHEN/ENABLE(0000103E): Done status GET_PASSWORD
Jun 12 18:11:27.063: AAA/AUTHEN/ENABLE(0000103E): Processing request action LOGIN
Jun 12 18:11:27.097: AAA/AUTHEN/ENABLE(0000103E): Done status FAIL - bad password
Below is the aaa and tacacs configuration:
!
aaa new-model
!aaa authentication login default group tacacs+ enable
!aaa session-id common
tacacs-server host X.X.X.X
tacacs-server host B.B.B.B
tacacs-server directed-request
tacacs-server key 7 XXXXXXXX
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-12-2020 02:03 PM
Thanks for the additional information. Perhaps you can clarify something for me. The original post seems to think there was a problem with the enable password. This output clearly shows that tacacs is generating the fail response. The partial config that you posted has tacacs doing login authentication but not doing authentication for enable. So are the debug results generated when you attempt to login to the router or were already logged in and the debug was when you attempted to go to enable mode?
Rick
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-13-2020 09:11 AM
Hello Richard,
The debug is the results generated when I attempt to login to the switch in user mode with my regular network password but when I put the local enable password of the switch I can get into the switch in user mode and then in a privileged mode without issue.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-13-2020 10:14 AM
Thanks for clarifying that the debug output corresponds to your attempt to login to the switch. I have a few things to follow up to investigate this issue:
- does this user ID and password work on other Cisco equipment in your network?
- do the logs on the tacacs server show the login attempt and failure to authenticate using tacacs?
- would you attempt to login, and then post the output of the command show tacacs?
Rick
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-13-2020 10:41 AM
Hey Richard,
Here you have the response.
1) - does this user ID and password work on other Cisco equipment in your network?
Yes, the user ID and password are working on other Cisco equipment in my network.
2) - do the logs on the tacacs server show the login attempt and failure to authenticate using tacacs?
The log on the Tacacs isn't showing up any attempt or failure from this device seems like the switch and the server are not talking to each other.
3) - would you attempt to login, and then post the output of the command show tacacs?
The Tacacs server is not showing up any attempt or failure from this device.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-13-2020 10:54 AM
I think you may not have understood my request to run show tacacs. I was asking you to run this on the switch and post the output from the switch - not asking what the server shows.
Rick
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-13-2020 10:59 AM
Ok, I got it.
aaa new-model
!
aaa authentication login default group tacacs+ enable
!
aaa session-id common
tacacs-server host X.X.X.X
tacacs-server host Z.Z.Z.Z
tacacs-server directed-request
tacacs-server key 7 RRRRRRRRR
