Solved

Enable Secret/Password on Nexus 5k

Posted on 2011-02-24
6
2,338 Views
Last Modified: 2012-05-11
In Cisco IOS, I would use the command "enable secret [LINE]" to set the the elevated priv password.

How is this done in NX-OS / on a Nexus 5k?
0
Comment
Question by:c-h-r-i-s-t-o-p-h
  • 3
  • 2
6 Comments
 
LVL 12

Assisted Solution

by:jjmartineziii
jjmartineziii earned 500 total points
Comment Utility
switch(config)#feature privilege
switch(config)# enable secret <password>
0
 
LVL 12

Accepted Solution

by:
jjmartineziii earned 500 total points
Comment Utility
in nx-os, you have to enable "features" before you use them.
0
 

Author Comment

by:c-h-r-i-s-t-o-p-h
Comment Utility
How do I enable "feature privledge"?

Please reference the output below.

 
switch(config)# feature ?
  fcoe            Enable/Disable FCoE/FC feature
  fex             Enable/Disable FEX
  interface-vlan  Enable/Disable interface vlan
  lacp            Enable/Disable LACP
  private-vlan    Enable/Disable private-vlan
  ssh             Enable/Disable ssh
  tacacs+         Enable/Disable tacacs+
  telnet          Enable/Disable telnet
  udld            Enable/Disable UDLD
  vpc             Enable/Disable VPC (Virtual Port Channel)

Open in new window

0
Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

 
LVL 12

Assisted Solution

by:jjmartineziii
jjmartineziii earned 500 total points
Comment Utility
http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/command/reference/rel_5_0/security_cmd_ref.html#wp1706231

Maybe this can help.

Try a "show feature-set" or "show feature" and see if its enabled already
0
 
LVL 50

Expert Comment

by:Don Johnston
Comment Utility
Things are done differently in NS-OS. Access is by "roles"

For privileged mode (on IOS platforms) access on an NX-OS platform for user "Home" with a password of "Simpson1", do the following:

username Homer password 5 Simpson1 role network-admin

0
 

Author Closing Comment

by:c-h-r-i-s-t-o-p-h
Comment Utility
secret enabled!
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now