Security Commands
944
key
Use the
key
command in TACACS Configuration mode to specify the
authentication and encryption key for all TACACS communications between
the device and the TACACS server. This key must match the key used on the
TACACS daemon.
Syntax
key
[0|7] key-string
no key
• 0—The key string that follows is the unencrypted shared secret. The
length is 1–128 characters.
• 7—The key string that follows is the encrypted shared secret. The length is
256 characters.
• key-string — Specifies the key string in encrypted or unencrypted form. It
may be up to 128 characters in length in unencrypted format and 256
characters in length in encrypted format.
Default Configuration
If left unspecified, the key-string parameter defaults to the global value.
Command Mode
TACACS Configuration mode
User Guidelines
The key command accepts any printable characters for the key except a
question mark. Enclose the string in double quotes to include spaces within
the key. The surrounding quotes are not used as part of the name. The CLI
does not filter illegal characters and may accept entries up to the first illegal
character or reject the entry entirely.
If no encryption parameter is present, the key string is interpreted as an un-
encrypted shared secret.
–
Summary of Contents for N1100-ON
Page 2: ......
Page 4: ......
Page 258: ...Using the CLI 258 ...
Page 488: ...Layer 2 Switching Commands 488 Operational State Querier Operational version 1 ...
Page 656: ...Layer 2 Switching Commands 656 10 ...
Page 1128: ...Audio Visual Bridging Commands 1128 ...
Page 1186: ...Data Center Technology Commands 1186 ...
Page 1435: ...Layer 3 Routing Commands 1435 Number of Joins 7 Number of Groups 1 ...
Page 2330: ......
Page 2331: ...www dell com support dell com Printed in the U S A ...
Page 2332: ......