
I want to
curse whomever at Cisco who wrote this message:
Warning:
If you have selected Enable Password in Common Parameters pane and Enable Secret in IOS Parameters pane as Disable then Enable Secret password is updated in the Credentials database.
If you have selected Enable Password as No Change in the Common Parameters pane and selected Disable for Enable Secret in the IOS Parameters pane, then Enable Secret Password is updated in the Device and Credentials database.
If you have selected Enable Password as Disable in the Common Parameters pane, and selected No Change for Enable Secret in the IOS Parameters pane, then Enable Password is updated in the Device and Credentials database.
Cisco's software always leaves a lot to be desired, maybe more than others'. But this is beyond the pale.
Additional notes: The person who designed this thing called "Enable Password Configuration" must be smoking something illegal. Because as it turns out, the message is bogus!
ReplyDeleteHere is an example:
----
Common Parameters:
Action = Disable
Password = xxxxxxxx
IOS Parameters:
Secret:
Action = Enable
Secret = xxxxxxxx
CatOS Parameters:
PasswordFor:
Action = No Change
----
The resulted CLI commands:
IOS devices:
no enable password
enable secret 5 ********
CatOS devices: N/A