You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently TACACS keys are stored as password 7 which can be converted back from this pseudo hash to plain text.
Support should be added for AES-256-GCM
veos(config)#tacacs-server host 1.2.3.4 vrf MGMT key ?
0 Indicates that the key string is not encrypted
7 Specifies that a HIDDEN key will follow
8a Specifies that a AES-256-GCM encrypted key will follow
LINE Unobfuscated key string
Enhancement summary
Currently TACACS keys are stored as password 7 which can be converted back from this pseudo hash to plain text.
Support should be added for
AES-256-GCM
https://github.com/aristanetworks/ansible-avd/blob/devel/ansible_collections/arista/avd/roles/eos_cli_config_gen/templates/eos/tacacs-servers.j2#L19-L21
Which component of AVD is impacted
eos_cli_config_gen
Use case example
Harden config security
Describe the solution you would like
Speciy key type and key in one line.
Describe alternatives you have considered
No response
Additional context
No response
Contributing Guide
The text was updated successfully, but these errors were encountered: