Solved

Cisco credential login

Posted on 2013-11-19
3
305 Views
Last Modified: 2013-11-19
I know that we need "enable secret PWD" to get to the enable mode. But what is the difference between username NAME secret PWD and username NAME password PWD? As the best practice, which one should I use? Thanks
0
Comment
Question by:leblanc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 26

Accepted Solution

by:
pony10us earned 500 total points
ID: 39659692
username NAME password PWD leaves the password in plain text in the config instead of using the MD5 hash that is used by username NAME secret PWD.
0
 
LVL 1

Author Comment

by:leblanc
ID: 39659834
So which one is the best practice to configure on the Cisco device.
0
 
LVL 26

Assisted Solution

by:pony10us
pony10us earned 500 total points
ID: 39659857
Best practice would be username NAME secret PWD.  The only benefit to the other option that I am aware of is that if you forget the password and you have backups of the running config you can go there to see what it is without having to go through password recovery.

Not enough benefit to offset the security risks in my opinion.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I had an issue with InstallShield not being able to use Computer Browser service on Windows Server 2012. Here is the solution I found.
This program is used to assist in finding and resolving common problems with wireless connections.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question