TACACS plus psk encryption
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2020 11:54 AM
We are trying to convert or move away from our level TACACS+ 7 psk to a stronger encryption method. We have been searching documents and have not come up with an answer. we are testing this on Cisco cat 9300 switches. Can anybody shed light on this for us on the 9300 platform?
thanks,
- Labels:
-
Other Network Security Topics
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2020 08:24 PM
As far as I can tell it's not currently an option on the Catalyst 9300 series as of the latest 17.1 (Amsterdam train) software.
Other switches do support it. For example, the Catalyst 3650 with IOS-XE 15.4(1)T or later:
The Cisco feature navigator tool does not return any results for this specific feature:
https://cfn.cloudapps.cisco.com/ITDIT/CFN/jsp/by-feature-technology.jsp
(searched by both "TACACS" and "AES")
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-28-2020 11:26 AM
Hello Marvin ,
Thank you for your response. My network engineer kept searching yesterday and found the following.
(config)#key config-key password-encryption (master key)
(config)#password encryption aes
(config)#tacacs server (server)
(config-server-tacacs)#key (key)
sh run
(TACACS)
tacacs server server name
address ipv4 server IP
key 6 XXXXXXXXXXXXXXXXXXXXXXXXXX ( i made all x's
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-28-2020 06:51 PM
@JerryLarson7922 nice find! Thanks for sharing.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-29-2020 06:57 AM
Hi,
That's a beautiful solution, but be aware of the following:
- the configured key is NOT stored in the configuration, you just need to remember it, or if you forget it, delete the old one (meantime services will no longer work, cause the clear-text key cannot be decrypted) and add a new one
- there used to be many bugs with this feature, where the device will somehow loose the key after a reboot, thus breaking the services making use of the encrypted keys; use a stable IOS version to avoid such issues.
Regards,
Cristian Matei.
