We had a Pix Firewall device go down and we are trying to find out where do the configs get archived. Is there anyway to pull down the configs in clear text so we can pull down the encryption keys from the devices?
A feature request by TAC doesn't hold much weight. A feature request made by the sales organization which can back things up with dollar figures means a whole lot more. Typically, TAC encourages customers to talk to their account team, SE, account manager, etc. to open a PERS ticket requesting a new or enhanced feature.
This method is hardcoded, and cannot be changed without recompiling parts of the PIX device package.
Pushing the config back would likely set the isakmp key to ****** which would be useless. Sounds like you'll need to look elsewhere for that key. This is akin to the problem we face with SNMPv3 users :-(.
If the shadow config shows asterisks for the isakmp key, then that is how the PIX provided it when a show run was issued. That means there will be no place in LMS where that key would be visible in clear text.