5-19
Authentication
Configuring on the Switch
Name
Default
Range
host <
ip-addr
> [key <
key-string
>]
| [oobm]
none
n/a
Specifies the IP address of a device running a server application. Optionally, can also specify the unique, per-
server encryption key to use when each assigned server has its own, unique key. For more on the encryption key, see
“Using the Encryption Key” on page 5-26 and the documentation provided with your server application.
For switches that have a separate out-of-band management port, the
oobm
parameter specifies that the traffic
will go through the out-of-band management (OOBM) port.
You can enter up to three IP addresses; one first-choice and two (optional) backups (one second-choice and one third-
choice).
Use
show tacacs
to view the current IP address list.
If the first-choice server fails to respond to a request, the switch tries the second address, if any, in the show
tacacs list. If the second address also fails, then the switch tries the third address, if any.
(See figure 5-3, “Example of the Switch’s Configuration Listing” on 5-9.)
The priority (first-choice, second-choice, and third-choice) of a server in the switch’s configuration
depends on the order in which you enter the server IP addresses:
1.When there are no servers configured, entering a server IP address makes that server the first-choice
server.
2.When there is one serves already configured, entering another server IP address makes that server the
second-choice (backup) server.
3.When there are two servers already configured, entering another server IP address makes that server
the third-choice (backup) server.
• The above position assignments are fixed. Thus, if you remove one server and replace it with another, the new server
assumes the priority position that the removed server had. For example, suppose you configured three servers, A, B,
and C, configured in order:
First-Choice:
A
Second-Choice:
B
Third-Choice: C
• If you removed server B and then entered server X, the server order of priority would be:
First-Choice:
A
Second-Choice:
X
Third-Choice: C
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......