616
C
HAPTER
33: HWTACACS C
ONFIGURATION
Pay attention to the following when configuring a TACACS server:
■
HWTACACS server does not check whether a scheme is being used by users when
changing most of HWTACACS attributes, unless you delete the scheme.
■
By default, the TACACS server has no key.
In the above configuration tasks, creating HWTACACS scheme and configuring
TACACS authentication/authorization server are required; all other tasks are optional
and you can determine whether to perform these configurations as needed.
Creating a HWTACAS
Scheme
As afore mentioned, HWTACACS protocol is configured scheme by scheme.
Therefore, you must create a HWTACACS scheme and enter HWTACACS view before
you perform other configuration tasks.
Perform the following configuration in system view.
By default, no HWTACACS scheme exists.
If the HWTACACS scheme you specify does not exist, the system creates it and enters
HWTACACS view.
The system supports up to 16 HWTACACS schemes. You can only delete the schemes
that are not being used.
Setting the
Username
Format
Acceptable to
the TACACS
Server
Setting the
username format for
the TACACS server
user-name-
format
HWTACACS
Configuring the
format of user name
Setting the Unit
of Data Flows
Destined for the
TACACS Server
Setting the data flow
unit for the TACACS
server
data-flow-format
HWTACACS
Configuring flow
traffic unit
Setting Timers
Regarding
TACACS Server
Setting the timers of
the TACACS server
timer
response-timeout
HWTACACS
Setting the TACACS
server response
timeout time
timer quiet
HWTACACS
Setting the waiting
time before the
primary TACACS
server resumes the
active state
timer realtime-
accounting
HWTACACS
Setting the real-time
accounting interval
Table 671
HWTACACS configuration (continued)
Section
Task
Command
View
Description
Table 672
Creating a HWTACACS scheme
Operation
Command
Create a HWTACACS scheme and enter
HWTACACS view.
hwtacacs scheme
hwtacacs-scheme-name
Delete a HWTACACS scheme.
undo hwtacacs scheme
hwtacacs-scheme-name
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...