5-22
Authentication
Configuring on the Switch
Figure 5-9.
Example of the Switch After Assigning a Different “First-Choice” Server
To remove the 10.28.227.15 device as a server, you would use this
command:
HP Switch
(config)# no tacacs-server host 10.28.227.15
Configuring an Encryption Key.
Use an encryption key in the switch if the
switch will be requesting authentication from a server that also uses
an encryption key. (If the server expects a key, but the switch either does not
provide one, or provides an incorrect key, then the authentication attempt will
fail.) Use a
global encryption key
if the same key applies to all
servers the switch may use for authentication attempts. Use a
per-server
encryption key
if different servers the switch may use will have different keys.
(For more details on encryption keys, see “Using the Encryption Key” on page
5-26.)
To configure
north01
as a global encryption key:
HP Switch
(config) tacacs-server key north01
To configure
north01
as a per-server encryption key:
HP Switch
(config)# tacacs-server host 10.28.227.63 key
north01
An encryption key can contain up to 100 characters, without spaces, and is
likely to be case-sensitive in most server applications.
To delete a global encryption key from the switch, use this command:
HP Switch
(config)# no tacacs-server key
HP Switch(config)# show tacacs
Status and Counters - TACACS Information
Timeout : 5
Encryption Key :
Server IP Address Closes Aborts Errors Pkts Rx Pkts Tx
----------------- ------ ------ ------ -------- -------
10.28.227.15 0 0 0 0 0
10.28.227.10 0 0 0 0 0
The “10” server is now the “
first-choice
” authentication device.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......