Book now with code EOY2025
mikeybikes wrote: » Use the command: service password-encryption
jdballinger wrote: » If you create a local user on the device using the "username BOB privilege 15 secret PASSWORD" the the actual password will be hashed in the running config. The password is unable to be decrypted because it is a salted MD5 hash, not the usual 7-type passwords like the 'enable secret' password would be. the only way to figure it out if someone got a hold of the hash would be through a brute-force attack, or a really really lucky rainbow table hit, though the salting makes this nearly mathematically impossible.
networker050184 wrote: » If someone gets to the point where they are looking at your configuration to see the username you already have plenty of security issues.
YFZblu wrote: » Indeed!
Futura wrote: » Thank you for this post, really useful. I didn't realise that using the Privilege level command would make it a secret rather than a password. Will try the suggestions tomorrow.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!