02-27-2020 11:54 AM
We are trying to convert or move away from our level TACACS+ 7 psk to a stronger encryption method. We have been searching documents and have not come up with an answer. we are testing this on Cisco cat 9300 switches. Can anybody shed light on this for us on the 9300 platform?
thanks,
02-27-2020 08:24 PM
As far as I can tell it's not currently an option on the Catalyst 9300 series as of the latest 17.1 (Amsterdam train) software.
Other switches do support it. For example, the Catalyst 3650 with IOS-XE 15.4(1)T or later:
The Cisco feature navigator tool does not return any results for this specific feature:
https://cfn.cloudapps.cisco.com/ITDIT/CFN/jsp/by-feature-technology.jsp
(searched by both "TACACS" and "AES")
02-28-2020 11:26 AM
Hello Marvin ,
Thank you for your response. My network engineer kept searching yesterday and found the following.
(config)#key config-key password-encryption (master key)
(config)#password encryption aes
(config)#tacacs server (server)
(config-server-tacacs)#key (key)
sh run
(TACACS)
tacacs server server name
address ipv4 server IP
key 6 XXXXXXXXXXXXXXXXXXXXXXXXXX ( i made all x's
02-28-2020 06:51 PM
@JerryLarson7922 nice find! Thanks for sharing.
02-29-2020 06:57 AM
Hi,
That's a beautiful solution, but be aware of the following:
- the configured key is NOT stored in the configuration, you just need to remember it, or if you forget it, delete the old one (meantime services will no longer work, cause the clear-text key cannot be decrypted) and add a new one
- there used to be many bugs with this feature, where the device will somehow loose the key after a reboot, thus breaking the services making use of the encrypted keys; use a stable IOS version to avoid such issues.
Regards,
Cristian Matei.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide