The reason being is I have templates I use to setup distribution routers with a default known password so we can access it before its fully provisioned. But after its fully operational it should be accessed with RADIUS login credentials, and the locally stored password should be changed to a unique one. I want to know if this step has been skipped so I can change it
We use Solarwinds NCM and I have a lot of compliance templates written to sweep our entire network looking for config that isn't to our standard. And part of this is changing that password. I would like to know if there's a way to show user accounts matching this default password, and if so the device is not compliant and will get flagged so I can go and change it
I can see that I can use this command but it doesn't seem to work the way I expect
Code: Select all
/user print where password="ABC123"
Code: Select all
/user print where password!="ABC123"
Does this parameter expect a hashed version of the password? If so what is the hashing algorithm so I can figure out what hash represents our default password