C
HAPTER
24
| Authentication Commands
Client
– 592 –
Retransmit Times : 2
Request Timeout : 5
Server 1:
Server IP Address : 192.168.1.1
Auth-port : 1812
Acct-port : 1813
Retransmit Times : 2
Request Timeout : 5
Console#
C
LIENT
Terminal Access Controller Access Control System () is a logon
authentication protocol that uses software running on a central server to
control access to TACACS-aware devices on the network. An authentication
server contains a database of multiple user name/password pairs with
associated privilege levels for each user or group that require management
access to a switch.
tacacs-server
This command specifies the server and other optional
parameters. Use the
no
form to remove the server, or to restore the
default values.
S
YNTAX
tacacs-server
index
host
host-ip-address
[
key
key
]
[
port
port-number
]
no tacacs-server
index
index
- The index for this server. (Range: 1)
host-ip-address
- IP address of a server.
key
- Encryption key used to authenticate logon access for the
client. Do not use blank spaces in the string. (Maximum length: 48
characters)
port-number
- server TCP port used for authentication
messages. (Range: 1-65535)
Table 64: Client Commands
Command
Function
Mode
tacacs-server
Specifies the server and optional
parameters
GC
tacacs-server host
Specifies the server
GC
tacacs-server key
Sets the encryption key
GC
tacacs-server port
Specifies the server network port
GC
show tacacs-server
Shows the current settings
GC
Summary of Contents for ES3510MA
Page 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Page 4: ...ABOUT THIS GUIDE 4...
Page 30: ...CONTENTS 30...
Page 40: ...FIGURES 40...
Page 46: ...TABLES 46...
Page 48: ...SECTION I Getting Started 48...
Page 72: ...SECTION II Web Configuration 72...
Page 88: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 88...
Page 116: ...CHAPTER 4 Basic Management Tasks Resetting the System 116...
Page 154: ...CHAPTER 5 Interface Configuration VLAN Trunking 154...
Page 216: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 216...
Page 350: ...CHAPTER 14 Security Measures DHCP Snooping 350...
Page 440: ...CHAPTER 17 IP Services Displaying the DNS Cache 440...
Page 484: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 484...
Page 554: ...CHAPTER 21 System Management Commands Switch Clustering 554...
Page 574: ...CHAPTER 22 SNMP Commands 574...
Page 582: ...CHAPTER 23 Remote Monitoring Commands 582...
Page 636: ...CHAPTER 24 Authentication Commands Management IP Filter 636...
Page 736: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 736...
Page 816: ...CHAPTER 34 VLAN Commands Configuring Voice VLANs 816...
Page 830: ...CHAPTER 35 Class of Service Commands Priority Commands Layer 3 and 4 830...
Page 848: ...CHAPTER 36 Quality of Service Commands 848...
Page 900: ...CHAPTER 38 LLDP Commands 900...
Page 910: ...CHAPTER 39 Domain Name Service Commands 910...
Page 916: ...CHAPTER 40 DHCP Commands DHCP Client 916...
Page 948: ...CHAPTER 41 IP Interface Commands IPv6 Interface 948...
Page 950: ...SECTION IV Appendices 950...
Page 982: ...INDEX 982...
Page 983: ......