{"id":341,"date":"2011-09-29T07:43:00","date_gmt":"2011-09-29T12:43:00","guid":{"rendered":"http:\/\/www.thedarktimes.us\/wordpress\/?p=341"},"modified":"2011-09-29T07:43:00","modified_gmt":"2011-09-29T12:43:00","slug":"asa5505-enable-password","status":"publish","type":"post","link":"https:\/\/www.thedarktimes.us\/wordpress\/asa5505\/asa5505-enable-password\/%20","title":{"rendered":"ASA5505 ENABLE PASSWORD"},"content":{"rendered":"<p>An enable password is defined as follows:<\/p>\n<p>\u2022Must contain from 1 to 25 uppercase and lowercase alphanumeric characters.<\/p>\n<p>\u2022Must not have a number as the first character.<\/p>\n<p>\u2022Can have leading spaces, but they are ignored. However, intermediate and trailing spaces are recognized.<\/p>\n<p>\u2022Can contain the question mark (?) character if you precede the question mark with the key combination<strong> <\/strong>Crtl-v when you create the password; for example, to create the password<em> abc?123, <\/em>do the following:<\/p>\n<p>\u2013Enter <strong>abc<\/strong>.<\/p>\n<p>\u2013Type <strong>Crtl-v<\/strong>.<\/p>\n<p>\u2013Enter <strong>?123<\/strong>.<\/p>\n<p>When the system prompts you to enter the enable password, you need not precede the question mark with the Ctrl-v; you can simply enter abc?123 at the password prompt.<\/p>\n<h3>Examples<\/h3>\n<p>The following example enables the password &#8220;pswd2&#8221; for privilege level 2:<\/p>\n<pre>enable password level 2 pswd2<\/pre>\n<pre>\u00a0<\/pre>\n<p>The following example sets the encrypted password &#8220;$1$i5Rkls3LoyxzS8t9&#8221;, which has been copied from a router configuration file, for privilege level 2 using encryption type 7:<\/p>\n<pre>enable password level 2 5 $1$i5Rkls3LoyxzS8t9<\/pre>\n<h3>Related Commands<\/h3>\n<table width=\"80%\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td colspan=\"2\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\">\n<p align=\"center\"><strong>Command <\/strong><\/p>\n<\/td>\n<td valign=\"bottom\">\n<p align=\"center\"><strong>Description <\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong>disable<\/strong><\/td>\n<td valign=\"top\">Exits privileged EXEC mode and returns to user EXEC mode.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong>enable<\/strong><\/td>\n<td valign=\"top\">Enters privileged EXEC mode.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong>enable secret<\/strong><\/td>\n<td valign=\"top\">Specifies an additional layer of security over the <strong>enable password<\/strong> command.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong>privilege<\/strong><\/td>\n<td valign=\"top\">Configures a new privilege level for users and associate commands with that privilege level.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong>service password-encryption<\/strong><\/td>\n<td valign=\"top\">Encrypts passwords.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong>show privilege<\/strong><\/td>\n<td valign=\"top\">Displays your current level of privilege.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>enable secret<\/h2>\n<p>To specify an additional layer of security over the <strong>enable password<\/strong> command, use the <strong>enable secret<\/strong> command in global configuration mode. To turn off the enable secret function, use the <strong>no<\/strong> form of this command.<\/p>\n<p><strong>enable secret <\/strong>[<strong>level<\/strong> <em>level<\/em>] {<em>password <\/em>| [<em>encryption-type<\/em>] <em>encrypted-password<\/em>}<\/p>\n<p><strong>no enable secret <\/strong>[<strong>level<\/strong> <em>level<\/em>]<\/p>\n<h3>Syntax Description<\/h3>\n<table width=\"80%\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td colspan=\"2\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong>level<\/strong><em> level<\/em><\/td>\n<td valign=\"top\">(Optional) Level for which the password applies. You can specify up to sixteen privilege levels, using numbers 0 through 15. Level 1 is normal EXEC-mode user privileges. If this argument is not specified in the command or in the <strong>no<\/strong> form of the command, the privilege level defaults to 15 (traditional enable privileges). The same holds true for the <strong>no<\/strong> form of the command.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><em>password<\/em><\/td>\n<td valign=\"top\">Password for users to enter enable mode. This password should be different from the password created with the <strong>enable password<\/strong> command.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><em>encryption-type<\/em><\/td>\n<td valign=\"top\">(Optional) Cisco-proprietary algorithm used to encrypt the password. Currently the only encryption type available for this command is 5. If you specify <em>encryption-type<\/em>, the next argument you supply must be an encrypted password (a password encrypted by a Cisco router).<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><em>encrypted-password<\/em><\/td>\n<td valign=\"top\">Encrypted password you enter, copied from another router configuratio<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>An enable password is defined as follows: \u2022Must contain from 1 to 25 uppercase and lowercase alphanumeric characters. \u2022Must not have a number as the first character. \u2022Can have leading spaces, but they are ignored. However, intermediate and trailing spaces are recognized. \u2022Can contain the question mark (?) character if you precede the question mark [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-341","post","type-post","status-publish","format-standard","hentry","category-asa5505"],"_links":{"self":[{"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/posts\/341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/comments?post=341"}],"version-history":[{"count":1,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/posts\/341\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/posts\/341\/revisions\/342"}],"wp:attachment":[{"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/media?parent=341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/categories?post=341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/tags?post=341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}