Security Commands
945
Keys are always displayed in their encrypted form in the running
configuration.
In an Access-Request, encrypted passwords are sent using the RSA Message
Digest algorithm (MD5).
The encryption algorithm is the same across switches. Encrypted passwords
may be copied from one switch and pasted into another switch configuration.
Command History
Updated in version 6.3.0.1 firmware.
Example
The following example sets the authentication encryption key.
console(config-tacacs)#key “This is a key string”
console(config-tacacs)#key 0 “This is a key string”
port
Use the
port
command in TACACS Configuration mode to specify a port
number on which a TACACS server listens for connections.
Syntax
port
[port-number]
• port-number — The server port number. If left unspecified, the default
port number is 49. (Range: 0–65535)
Default Configuration
The default port number is 49.
Command Mode
TACACS Configuration mode
User Guidelines
This command has no user guidelines.
Содержание N1100-ON
Страница 2: ......
Страница 4: ......
Страница 258: ...Using the CLI 258 ...
Страница 488: ...Layer 2 Switching Commands 488 Operational State Querier Operational version 1 ...
Страница 656: ...Layer 2 Switching Commands 656 10 ...
Страница 1128: ...Audio Visual Bridging Commands 1128 ...
Страница 1186: ...Data Center Technology Commands 1186 ...
Страница 1414: ...Layer 3 Routing Commands 1414 Command History Introduced in version 6 2 0 1 firmware Example console route map set metric 6432 ...
Страница 1435: ...Layer 3 Routing Commands 1435 Number of Joins 7 Number of Groups 1 ...
Страница 1598: ...Layer 3 Routing Commands 1598 Vl10 Rx 0 0 0 0 0 0 0 Tx 2 0 0 0 0 0 0 Invalid Packets Received 0 ...
Страница 1621: ...Layer 3 Routing Commands 1621 Vl10 Rx 0 0 0 0 0 0 0 Tx 2 0 0 0 0 0 0 Invalid Packets Received 0 ...
Страница 2330: ......
Страница 2331: ...www dell com support dell com Printed in the U S A ...
Страница 2332: ......