90 Chapter 3: Defending the Perimeter
The enable secret password appears in the running configuration as an MD5 hash value.
However, the console, auxiliary, and vty line passwords appear in the running configuration
as plain text, as shown in Example 3-5.
To better secure these passwords, a password encryption service can be enabled on the
router. This service uses a Cisco-proprietary algorithm that is based on a Vigenere cipher.
This algorithm is far from secure. Its password can be easily compromised with
downloadable utilities freely available on the Internet (such as the GetPass utility from
Boson Software). However, enabling the password encryption service does help prevent
someone from obtaining a password from the casual inspection of a router’s configuration.
The password encryption service is enabled in global configuration mode using the service
password-encryption command. After enabling this service, the console, auxiliary, and
vty line passwords appear in an encrypted format. The 7 that appears after the password
command indicates that the password has been encrypted using this Cisco-proprietary
encryption algorithm, as shown in Example 3-6.
Example 3-5 Line Passwords Appearing in Plain Text
R1# ss
ss
hh
hh
oo
oo
ww
ww
rr
rr
uu
uu
nn
nn
nn
nn
ii
ii
nn
nn
gg
gg
--
--
cc
cc
oo
oo
nn
nn
ff
ff
ii
ii
gg
gg
!
line con 0
password 1mA$3cr3t
login
line aux 0
password @uxP@$$w0rd
login
line vty 0 4
password MyP@$$w0rd
login
Example 3-6 Cisco-Proprietary Password Encryption Results
R1(config)# ss
ss
ee
ee
rr
rr
vv
vv
ii
ii
cc
cc
ee
ee
pp
pp
aa
aa
ss
ss
ss
ss
ww
ww
oo
oo
rr
rr
dd
dd
--
--
ee
ee
nn
nn
cc
cc
rr
rr
yy
yy
pp
pp
tt
tt
ii
ii
oo
oo
nn
nn
R1# ss
ss
hh
hh
oo
oo
ww
ww
rr
rr
uu
uu
nn
nn
!
line con 0
password 7 091D43285D5614005818
login
line aux 0
password 7 06261A397C6E4D5D1247000F
login
line vty 0 4
password 7 09615739394153055B1E00
login
Comments to this Manuals