On 2023-04-29 14:47, Richard Clayton via cisco-nsp wrote:
Hi Guys
s/Guys/everyone/g
archive
path scp://
user:password@1.2.3.4/CUSTOMERS/CUSTOMER1/CUSTOMER-LONDON6-ETH1.cfg
write-memory
time-period 10080
Because the password part of the SCP config is not an IOS recognised
password I don't appear to be able to encrypt it. If that's the case
is
there a secure fudge, like somehow referencing a local username that
does
have password encryption.
I suspect what you're in need of here is pubkey-based authentication for
outbound SSH connections.
Most of the search hits on Google are 15,000 year old blog posts talking
about configuring VTYs for logins, so I can't locate the guidance
easily.
However, knowing what you're searching for is half the pain! There
should be support for configuring a private key for outbound SSH-based
comms (such as SCP) globally within the system, so hopefully the correct
documentation for your version of IOS should contain something of that
sort (it is most likely that it won't be included in the section
concerning 'archive').
If not, of course, it's a good thing to ask Cisco TAC. :)
Tom
_______________________________________________
cisco-nsp mailing list cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/