License Requirement
Product
Password encryption requires no license. Any feature not included in a license package is
bundled with the nx-os image and is provided at no extra charge to you. For an explanation
of the Cisco NX-OS licensing scheme, see the
Cisco NX-OS Licensing Guide
.
Cisco
NX-OS
Guidelines and Limitations for Password Encryption
Password encryption has the following configuration guidelines and limitations:
• Only users with administrator privilege (network-admin) can configure the AES password encryption
feature, associated encryption and decryption commands, and master keys.
• RADIUS and are the only applications that can use the AES password encryption feature.
• Configurations containing type-6 encrypted passwords are not rollback compliant.
• You can enable the AES password encryption feature without a master key, but encryption starts only
when a master key is present in the system.
• Deleting the master key stops type-6 encryption and causes all existing type-6 encrypted passwords to
become unusable, unless the same master key is reconfigured.
• To move the device configuration to another device, either decrypt the configuration before porting it to
the other device or configure the same master key on the device to which the configuration will be applied.
Default Settings for Password Encryption
This table lists the default settings for password encryption parameters.
Table 35: Default Password Encryption Parameter Settings
Default
Parameters
Disabled
AES password encryption feature
Not
configured
Master key
Configuring Password Encryption
This section describes the tasks for configuring password encryption on Cisco NX-OS devices.
Configuring a Master Key and Enabling the AES Password Encryption Feature
You can configure a master key for type-6 encryption and enable the Advanced Encryption Standard (AES)
password encryption feature.
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
414
Configuring Password Encryption
Guidelines and Limitations for Password Encryption