4-20
Authentication
Configuring on the Switch
Table 4-3.
Details on Configuring TACACS Servers and Keys
Name
Default
Range
tacacs-server host <
ip-addr
>
none
n/a
This command specifies the IP address of a device running a server application. Optionally, it can also specify
the unique, per-server encryption key to use when each assigned server has its own, unique key. For more on the
encryption key, see “Using the Encryption Key” on page 4-26 and the documentation provided with your server
application.
You can enter up to three IP addresses; one first-choice and two (optional) backups (one second-choice and one third-
choice).
Use
show tacacs
to view the current IP address list.
If the first-choice server fails to respond to a request, the switch tries the second address, if any, in the show
tacacs list. If the second address also fails, then the switch tries the third address, if any.
(See figure 4-3, “Example of the Switch’s Configuration Listing” on 4-10.)
The priority (first-choice, second-choice, and third-choice) of a server in the switch’s configuration
depends on the order in which you enter the server IP addresses:
1. When there are no servers configured, entering a server IP address makes that server the first-choice
server.
2. When there is one serves already configured, entering another server IP address makes that server the
second-choice (backup) server.
3. When there are two servers already configured, entering another server IP address makes that server
the third-choice (backup) server.
• The above position assignments are fixed. Thus, if you remove one server and replace it with another, the new server
assumes the priority position that the removed server had. For example, suppose you configured three servers, A, B,
and C, configured in order:
First-Choice:A
Second-Choice:B
Third-Choice: C
• If you removed server B and then entered server X, the server order of priority would be:
First-Choice:A
Second-Choice:X
Third-Choice: C
• If there are two or more vacant slots in the server priority list and you enter a new IP address, the new
address will take the vacant slot with the highest priority. Thus, if A, B, and C are configured as above and you (1)
remove A and B, and (2) enter X and Y (in that order), then the new server priority list would be X, Y, and C.
• The easiest way to change the order of the servers in the priority list is to remove all server addresses in
the list and then re-enter them in order, with the new first-choice server address first, and so on.
To add a new address to the list when there are already three addresses present, you must first remove one of the currently
listed addresses.
See also “General Authentication Process Using a Server” on page 4-23.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......