The Cisco Nexus Series is a modular, fixed-port network project designed in 2008 as part of Cisco System’s data center design through the so-called “Nexus Switches”. For this, the technology company designed groups of equipment that offered better data and processing models that have left their mark on digital history through Cisco nexus password encryption.
Get to know all the functions and details exposed by the company since its creation to stay closer to the data processing and storage presented by the different Cisco nexus password encryption types.
The Cisco Nexus Switch series have a primary function of facilitating connections and resource management in data centers that are SDN networks.
In this way, they take advantage of the information and storage services through data and Ethernet and IP networks that allow creating open and programmable bases in an optimized virtual way.
These Cisco elements were created to provide access to all network resources and stored data for all available servers.It is also responsible for eliminating resources in parallel storage and computational networks to simplify the technological processes to ensure a stabilized and constant network.
The Nexus switching range
We review the main Cisco Nexus switching models that are available and have marked the company’s technologies.
- – Nexus 1000v virtual switch.
- – Nexus 2000 fabric extender.
- – Nexus 3000 series.
- – Nexus 4001 IBM Blade Center switch.
- – Nexus 5000 series.
- – Nexus 6000 series.
- – Nexus 7000 series modular datacenter switches.
- – Nexus 9000 series.
In the most outstanding series there are features of technical improvements in the service and appropriations of advances.
Cisco Nexus 3000 series: offers switches with low latency, high density and ease of programming.
Cisco Nexus 7000 series: modular switches with full NX-OS operation and programmable open source tools with defined use in software aspects.
Cisco Nexus 9000 series: deliver higher performance, good density, low latency and exceptional energy balance with a variety of form factors and applications.
Cisco nexus password encryption types
Enable Secret and Enable Password
The Cisco System command, Enable Password, is one of the options that should not be used in new equipment, and instead use the Enable Password command as an enhanced version in security aspects.
In case it cannot be used because it is not allowed, the second option can be applied under the condition of only not being allowed from the boot mode.
The secrets of the enablement are encrypted through the MD5 algorithm. According to Cisco, it is impossible to recover enable secrets due to a configuration file.
This applies only to passwords with the Enable Secret format, but is not available with Enable Password.
Most passwords and private authentication strings from Cisco configuration files are encrypted with a weak reversible scheme that is used for personal passwords.
To define which format to use for the encryption of a specific password, the digit that starts the encrypted string in the configuration file must be checked.
These options can be 5, which means that the password is encrypted with the strongest MD5 algorithm. Or 7, which is that the password has been encrypted with a weaker algorithm.
Enable Secret 5 $1$iUjJ$cDZ03KKKGh7mHfX2RSbDqP. (stronger)
While the use of the MD5 format gives the following pattern.
Password 7 07362E590E1B1C041B1E124C0A2F2E206832752E1A01134D. (weaker)