4-21
Authentication
Configuring on the Switch
Adding, Removing, or Changing the Priority of a Server.
Suppose that the switch was already configured to use servers at
10.28.227.10 and 10.28.227.15. In this case, 10.28.227.15 was entered first, and
so is listed as the first-choice server:
Figure 4-6. Example of the Switch with Two Server Addresses Configured
To move the “first-choice” status from the “15” server to the “10” server, use
the
no tacacs-server host <
ip-addr
>
command to delete both servers, then use
tacacs-server host <
ip-addr
>
to re-enter the “10” server first, then the “15” server.
The servers would then be listed with the new “first-choice” server, that is:
[ key <
key-string
> ]
none (null) n/a
Specifies the optional, global “encryption key” that is also assigned in the server(s) that the switch will access
for authentication. This option is subordinate to any “per-server” encryption keys you assign, and applies only to
accessing servers for which you have not given the switch a “per-server” key. (See the
host <
ip-addr
> [key
<
key-string
>
entry at the beginning of this table.)
For more on the encryption key, see “Using the Encryption Key” on page 4-26 and the documentation provided with your
server application.
timeout <1 - 255>
5 sec
1 - 255 sec
Specifies how long the switch waits for a server to respond to an authentication request. If the switch does
not detect a response within the timeout period, it initiates a new request to the next server in the list. If all
servers in the list fail to respond within the timeout period, the switch uses either local authentication (if
configured) or denies access (if
none
configured for local authentication).
Name
Default
Range
First-Choice Server
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......