Interesting, I thought you could disconnect other telnet sessions, but I can't seem to get anything to work. I thought it was 'disconnect' and then the session - anybody else?
I suggest you also configure service password-encryption, as a security measure.This encrypts all the passwords on the router with a weak encryption so as not to see passwords in clear text when you do show run
And also use telnet only in secure network, because telnet is very easy to eavesdrop (everything is in clear text)
service password-encryption doesn't make the CPU work constantly. It simply ensures that no passwords are ever displayed in cleartext. Perhaps you meant to say that it make the CPU work slightly harder when displaying a config?
I thought I read somewhere in one of Todd Lammle's books (CCSP) that it constantly works when this is enabled. I will look and quote what I read here in a little while.
Yes, here it is---in CCSP:Securing Cisco IOS Networks, by Todd Lammle and Carl Timm, CCIE#7149, page 43...
"At this point, turn off the service password-encryption command by using the no service password-encryption command as follows because the service password-encryption command is still running in the backround, and no one needs any extra threads taking up CPU cycles:"
Sounded pretty interesting, so I tried this out on a 3550. Turned off service password-encryption and checked cpu util (this switch is not in service, just sitting on my desk, so there would be no variation in traffic or anything), turned service password-encryption back on and there was no difference in the cpu utilization.
What Burt said seems logical, after all, it is a "service" that is running, but it doesn't appear to have an effect on a 3550 running a very basic config.
Then again, the CCSP is focused highly on security, so maybe used in conjunction with other configurations/commands, service password-encryption would put a higher load on the processor.
I'm pretty sure it isn't a service that is running, though. These aren't like Windows services or *nix daemons. It is only relevant when you attempt to display a config. The encryption engine is activated at that point in order to conceal passwords that otherwise would have been displayed in plain text. I'd bet my left small toe that Todd is wrong about this. If you're not displaying a config, this alleged service would have nothing to do and would not be taking up CPU cycles anyway.
If what Lammle says is true, there should be an extra process listed in "show proc cpu" after you enable this feature. I just did a before and after look at my process list and I have 251 processes running whether or not password encryption is enabled.
I'm also interested to know why they suggest turning off that feature. It costs nothing to leave it on, and it guards against accidentally allowing someone to see passwords, AAA keys, and SNMP community strings in plain text. Can you tell us what his reasoning is?
Yeah, I saw the same thing. I see what you mean about it being different from services or daemons on Win/Unix systems; however, I think some sub-commands under "services" do run constantly, and not just when running certain commands; "service timestamps", I would think would be one of those.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.