4-21
Authentication
Configuring on the Switch
Adding, Removing, or Changing the Priority of a Server.
Suppose that the switch was already configured to use servers at
10.28.227.10 and 10.28.227.15. In this case, 10.28.227.15 was entered first, and
so is listed as the first-choice server:
Figure 4-6. Example of the Switch with Two Server Addresses Configured
To move the “first-choice” status from the “15” server to the “10” server, use
the
no tacacs-server host <
ip-addr
>
command to delete both servers, then use
tacacs-server host <
ip-addr
>
to re-enter the “10” server first, then the “15” server.
The servers would then be listed with the new “first-choice” server, that is:
[ key <
key-string
> ]
none (null) n/a
Specifies the optional, global “encryption key” that is also assigned in the server(s) that the switch will access
for authentication. This option is subordinate to any “per-server” encryption keys you assign, and applies only to
accessing servers for which you have not given the switch a “per-server” key. (See the
host <
ip-addr
> [key
<
key-string
>
entry at the beginning of this table.)
For more on the encryption key, see “Using the Encryption Key” on page 4-26 and the documentation provided with your
server application.
timeout <1 - 255>
5 sec
1 - 255 sec
Specifies how long the switch waits for a server to respond to an authentication request. If the switch does
not detect a response within the timeout period, it initiates a new request to the next server in the list. If all
servers in the list fail to respond within the timeout period, the switch uses either local authentication (if
configured) or denies access (if
none
configured for local authentication).
Name
Default
Range
First-Choice Server
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......