Solved

Cisco credential login

Posted on 2013-11-19
3
297 Views
Last Modified: 2013-11-19
I know that we need "enable secret PWD" to get to the enable mode. But what is the difference between username NAME secret PWD and username NAME password PWD? As the best practice, which one should I use? Thanks
0
Comment
Question by:leblanc
  • 2
3 Comments
 
LVL 26

Accepted Solution

by:
pony10us earned 500 total points
Comment Utility
username NAME password PWD leaves the password in plain text in the config instead of using the MD5 hash that is used by username NAME secret PWD.
0
 
LVL 1

Author Comment

by:leblanc
Comment Utility
So which one is the best practice to configure on the Cisco device.
0
 
LVL 26

Assisted Solution

by:pony10us
pony10us earned 500 total points
Comment Utility
Best practice would be username NAME secret PWD.  The only benefit to the other option that I am aware of is that if you forget the password and you have backups of the running config you can go there to see what it is without having to go through password recovery.

Not enough benefit to offset the security risks in my opinion.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now