Another easy way is to use EEM when show running is issued and parse the
entire running config through eem so that when ever it encounters line
containing password, it will simply skip it.
________________________________
From: Jay McMickle <jay.mcmickle_at_yahoo.com>
To: Ovais Iqbal <ovais.iqball_at_yahoo.com>
Cc: Imran Ali <immrccie_at_gmail.com>;
"ccielab_at_groupstudy.com" <ccielab_at_groupstudy.com>
Sent: Saturday, February
16, 2013 6:09 PM
Subject: Re: read only access and need to protect all
sensitive passwords
Agreed. Enable views is what you are looking for.
However, while this limits the commands they can run, if you give them sh run,
it will still show your line password 7's. You shouldn't be running enable
pass on your routers, so I can only imagine you are concerned with the line
passwords.
Why not remove the line passwords and point to Local, Radius, or
TACACS and
you won't have those passwords to be seen?
No enable pass
Enable
secret ...
!
aaa new-model
username Cisco priv 15 pass Cisco
!
aaa auth login
default.....
Line con 0
Login auth local
line vty 0 15
Login auth local
Then
enable your views. (enable view)
And set the username login rights, etc.
I'm
going from memory here, so the syntax might be a little off, but you get
the
point.
Regards,
Jay McMickle- CCIE #35355 (RS)
Sent from my iPhone 5
Support
me to fight MS!
http://main.nationalmssociety.org/site/TR/Bike/TXHBikeEvents?px=5886043&pg=pe
rsonal&fr_id=20226
On Feb 15, 2013, at 11:35 PM, Ovais Iqbal
<ovais.iqball_at_yahoo.com> wrote:
> If you want to give only read only access
to the entire active config, then
> perhaps you can use views. It doesnt need
an external server and will
surely
> meet your requirements,
>
>
>
>
________________________________
> From: Imran Ali
> <immrccie_at_gmail.com>
>
To: Cisco certification <ccielab_at_groupstudy.com>
> Sent:
> Saturday, February
16, 2013 10:27 AM
> Subject: read only access and need to
> protect all
sensitive passwords
>
> Hi all,
>
> i need to give read only access
> of my
routers to an audit team .
>
> i have no issue setting up a radius
>
server to throug a exec level 7
> .... which i customised on the router
> to allow only show
>
> Privelege exec all level 7 show . i found
that
> he cant view
> routing config using " regular show run '' but with
can view
> last saved
> config with show sartup-config.
>
> the issue is my
radius server
> and their is no option to specify
> type 5 md5 strong
password .
>
> i am
> ending up with showing my Radius key ..... as type
7 can be
> easily de
> crepted .
>
> ......i also tried service
password encryption..but it is
> again
> using type 7 ...
>
>
>
> Any
chance of saving from over shoulder readng
> attack ?
>
>
> Blogs and
organic groups at http://www.ccie.net
>
Received on Sat Feb 16 2013 - 07:34:48 ART
This archive was generated by hypermail 2.2.0 : Fri Mar 01 2013 - 07:57:58 ART