cancel
Showing results for 
Search instead for 
Did you mean: 
Login & Join the DevCentral Connects Group to watch the Recorded LiveStream (May 12) on Basic iControl Security - show notes included.

How does one parse encrypted passwords in the config?

Mizzouri
Nimbostratus
Nimbostratus

I'm migrating from a 1600 to a 4200 and have a few instances of health monitors with passwords set. I'd like to be able to seem them in plain text. If this is not possible, can one simply copy/paste the monitor cli config and the F5 will understand this? Coming from a Cisco background where both are possible...thanks again.

2 REPLIES 2

Simon_Blakely
F5 Employee
F5 Employee

You cannot decrypt anything that has been encrypted with the master key.

 

Copying and pasting config will work, but only if the config elements were encrypted with the same master key.

By definition, BigIPs in a device group have the same master key so that encrypted config elements can be transferred.

 

Either set the master key on the target device prior to starting configuration, or change the master key on the source device to match the target, save and reload the config, and then copy the config stanzas to the target.

 

Even easier - build a device group between the two devices (or use a temporary VM as an intermediary), and sync the config.

 

Mizzouri
Nimbostratus
Nimbostratus

Alright, at this point, it looks like the easiest path is to f5mku -K on the old, f5mku -r on the new pair. Thanks for the advice!