<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2 enable passwords - Cisco Catalyst 1000 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888023#M1102816</link>
    <description>&lt;P&gt;If you authenticate against a TACACS server like Cisco ISE, every admin can have a separate enable password.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Jul 2023 18:32:21 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2023-07-19T18:32:21Z</dc:date>
    <item>
      <title>2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4886960#M1102726</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have one password enable&lt;/P&gt;&lt;P&gt;The command is:&lt;/P&gt;&lt;P&gt;(config)# enable password...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is any option to configure second enable password on the switch?&lt;/P&gt;&lt;P&gt;Thanks for help&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 13:05:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4886960#M1102726</guid>
      <dc:creator>network_security</dc:creator>
      <dc:date>2023-07-18T13:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4887983#M1102810</link>
      <description>&lt;P&gt;no you can config only one password in SW/R for enable.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 17:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4887983#M1102810</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-19T17:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888023#M1102816</link>
      <description>&lt;P&gt;If you authenticate against a TACACS server like Cisco ISE, every admin can have a separate enable password.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 18:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888023#M1102816</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2023-07-19T18:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888030#M1102817</link>
      <description>&lt;P&gt;Can I see example for this case, I dont see such config before&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 18:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888030#M1102817</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-19T18:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888079#M1102819</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa new-model
aaa authentication login default group tacacs
aaa authentication enable default group tacacs&lt;/LI-CODE&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CleanShot 2023-07-19 at 22.21.15@2x.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/191876iD1328C7CE5A0C446/image-size/large?v=v2&amp;amp;px=999" role="button" title="CleanShot 2023-07-19 at 22.21.15@2x.png" alt="CleanShot 2023-07-19 at 22.21.15@2x.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 20:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888079#M1102819</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2023-07-19T20:22:56Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888100#M1102820</link>
      <description>&lt;P&gt;First thanks a lot for this new info&lt;/P&gt;
&lt;P&gt;So&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If we dont use tacacs there is only ONE enable password&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If we use tacacs there is two behavior' if user have 15 privilege then login password is same as enable password' if the user not 15 privilege it need enable password and we can config with field you mention&lt;/P&gt;
&lt;P&gt;What I find more interesting is user can if you use tacacs change enable password if auto-enable is config.&lt;/P&gt;
&lt;P&gt;Thank again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hace a nice summer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 21:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888100#M1102820</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-19T21:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888219#M1102821</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;if you're using AAA/TACACS then you don't need the 'enable' command.&lt;/P&gt;&lt;P&gt;you'll use it when AAA fails and as a fall back.&lt;/P&gt;&lt;P&gt;you also want to "standardize" the enable PW if you're managing several switches.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 01:58:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888219#M1102821</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2023-07-20T01:58:54Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888344#M1102822</link>
      <description>&lt;P&gt;Thanks A lot guys.&lt;/P&gt;&lt;P&gt;Can I configure Active Directory with C1000 Switch and AD will provide enable password for every user?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 06:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888344#M1102822</guid>
      <dc:creator>network_security</dc:creator>
      <dc:date>2023-07-20T06:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888350#M1102823</link>
      <description>&lt;P&gt;No, this is not possible if you authenticate directly to your Windows server (which is then typically done with RADIUS).&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 06:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888350#M1102823</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2023-07-20T06:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888354#M1102824</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326072"&gt;@johnlloyd_13&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;if you're using AAA/TACACS then you don't need the 'enable' command.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This is not dependent on the usage of AAA/TACACS or not. Any way of AAA (local or centralized) can be done with or without enable password. It's all about the defined requirement for the login process and which config fits best for the environment.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 06:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888354#M1102824</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2023-07-20T06:48:50Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888356#M1102825</link>
      <description>&lt;P&gt;Ok.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 06:49:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4888356#M1102825</guid>
      <dc:creator>network_security</dc:creator>
      <dc:date>2023-07-20T06:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: 2 enable passwords - Cisco Catalyst 1000</title>
      <link>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4889955#M1102879</link>
      <description>&lt;P&gt;If you configure the switch to authenticate with Active Directory using the RADIUS services in AD (NPS), you can configure it in such a way that admins are put into enable/privilege level 15 after logging in, eliminating the requirement for them to know the enable password.&lt;/P&gt;
&lt;P&gt;That way each admin has their own credentials when logging into the device, and no password needs to be shared between them.&lt;/P&gt;
&lt;P&gt;Of course there are different security aspects between RADIUS and TACACS+ packets, including how much of the packet is encrypted.&lt;/P&gt;
&lt;P&gt;This can also be achieved using local users on the device, for example with the following commands:&lt;BR /&gt;aaa authorization exec default local if-authenticated&lt;BR /&gt;username jimmy&amp;nbsp;privilege 15 secret &amp;lt;...&amp;gt;&lt;/P&gt;
&lt;P&gt;If you google for "Authentication Authorization and Accounting Configuration Guide Cisco IOS" you can find guides for both ios and ios-xe which explain this in more detail.&lt;/P&gt;
&lt;P&gt;Another thing I would like to point out is that you mention in the original post that the command you plan on using is:&lt;BR /&gt;"enable password &amp;lt;...&amp;gt;"&lt;/P&gt;
&lt;P&gt;On ios appliances this generates a password that can either be seen in the config in clear text or obfuscated in a way that's easily reversible.&lt;BR /&gt;A better approach is to use the following command:&lt;BR /&gt;"enable secret &amp;lt;...&amp;gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2023 22:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-enable-passwords-cisco-catalyst-1000/m-p/4889955#M1102879</guid>
      <dc:creator>Jonatan Jonasson</dc:creator>
      <dc:date>2023-07-21T22:22:53Z</dc:date>
    </item>
  </channel>
</rss>

