To view the effect, this command has had, view the running configuration once more. This time, however, you will use a filter on the command so that you can focus on one particular element, the enable password.
There are a number of filters you can use at the end of many commands. These are invoked when you use the pipe “|” symbol. For example, the command below will filter the running configuration and show you only lines that contain the words enable password. Use this command in privileged mode:
NYACCESS1# show running-config | include enable password
Press Enter.
You will see the following output:
NYACCESS1#show running-config | include enable password
enable password 7 13061E01080355
NYACCESS1#
You can see that the password is now encrypted.
Task 2 - Know about Startup and Running Configurations
When you make changes to a switch’s configuration, you are making changes to the running-config of the device. This configuration is stored in the RAM and is the configuration that is always in effect. When you issue new commands, these commands change the running-config and take effect immediately. However, because this configuration is in RAM, if the device is turned off, the running configuration ceases to exist.
Conversely, the startup-config is kept in Non-Volatile RAM or NVRAM, which remains intact if power is lost. When a switch initially boots up, it takes the startup-config from NVRAM and copies it to the running-config in RAM. When you make changes to the running-config, and you want those changes to be available in case of a reboot, you must copy the running-config to the startup-config.
If you do not do this, then when the device reboots, loses power, or for whatever reason fails, an older configuration may be loaded from NVRAM, which you may not have been expecting.
Note: This behaviour can be used to your advantage. Let’s say that you are configuring a remote device that is located in another state or country. If you make a mistake in your configuration, and you lose remote access to the device, what would you do? Worst case scenario you have to visit the device and repair the issue. The best-case scenario is that you can contact someone in the remote location to reboot the device, assuming they can access the physical location where the device is located and any changes you made, including those that caused the device to malfunction, have been eliminated. You can take this one step further and not require the aid of anyone at the remote location. You can, in fact, tell the device to reboot itself in a number of minutes or hours. It’s very common for an engineer who is configuring a device to issue this command in case the configuration goes wrong for any reason. It offers the ability to reboot to a known working state without the aid of someone on site.