5-20
Authentication
Configuring on the Switch
Figure 5-6. Example of Configuring a Host-Specific Key
Use the
show running-config
command to display the key information.
• If there are two or more vacant slots in the server priority list and you enter a new IP address, the new
address will take the vacant slot with the highest priority. Thus, if A, B, and C are configured as above and you (1)
remove A and B, and (2) enter X and Y (in that order), then the new server priority list would be X, Y, and C.
• The easiest way to change the order of the servers in the priority list is to remove all server addresses in
the list and then re-enter them in order, with the new first-choice server address first, and so on.
To add a new address to the list when there are already three addresses present, you must first remove one of the currently
listed addresses.
See also “General Authentication Process Using a Server” on page 5-24.
key <
key-string
>
none (null) n/a
Specifies the optional, global “encryption key” that is also assigned in the server(s) that the switch will access
for authentication. This option is subordinate to any “per-server” encryption keys you assign, and applies only to
accessing servers for which you have not given the switch a “per-server” key. (See the
host <
ip-addr
> [key
<
key-string
>
entry at the beginning of this table.)
You can configure a encryption key that includes a tilde (~) as part of the key, for example, “hp~network”. It is
not backward compatible; the “~” character is lost if you use a software version that does not support the “~” character
For more on the encryption key, see “Using the Encryption Key” on page 5-26 and the documentation provided with your
server application.
timeout <1 - 255>
5 sec
1 - 255 sec
Specifies how long the switch waits for a server to respond to an authentication request. If the switch does
not detect a response within the timeout period, it initiates a new request to the next server in the list. If all
servers in the list fail to respond within the timeout period, the switch uses either local authentication (if
configured) or denies access (if
none
configured for local authentication).
Name
Default
Range
HP Switch(config)# tacacs-server host 10.10.10.2 key hp~network
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......