4-22
Authentication
Configuring on the Switch
Figure 4-7.
Example of the Switch After Assigning a Different “First-Choice” Server
To remove the 10.28.227.15 device as a server, you would use this
command:
ProCurve(config)# no tacacs-server host 10.28.227.15
Configuring an Encryption Key.
Use an encryption key in the switch if the
switch will be requesting authentication from a server that also uses
an encryption key. (If the server expects a key, but the switch either does not
provide one, or provides an incorrect key, then the authentication attempt will
fail.) Use a
global encryption key
if the same key applies to all
servers the switch may use for authentication attempts. Use a
per-server
encryption key
if different servers the switch may use will have different keys.
(For more details on encryption keys, see “Using the Encryption Key” on page
4-26.)
To configure
north01
as a global encryption key:
ProCurve(config) tacacs-server key north01
To configure
north01
as a per-server encryption key:
ProCurve(config)# tacacs-server host 10.28.227.63 key
north01
An encryption key can contain up to 100 characters, without spaces, and is
likely to be case-sensitive in most server applications.
To delete a global encryption key from the switch, use this command:
ProCurve(config)# no tacacs-server key
The “10” server is now the “
first-choice
” authentication device.
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......