5-18
Authentication
Configuring on the Switch
N o t e o n
E n c r y p t i o n K e y s
Encryption keys configured in the switch must exactly match the encryption
keys configured in servers the switch will attempt to use for
authentication.
If you configure a global encryption key, the switch uses it only with servers
for which you have not also configured a server-specific key. Thus, a global
key is more useful where the servers you are using all have an
identical key, and server-specific keys are necessary where different
servers have different keys.
If server “X” does not have an encryption key assigned for the
switch, then configuring either a global encryption key or a server-specific key
in the switch for server “X” will block authentication support from server “X”.
Syntax:
tacacs-server host <
ip-addr
> [key <
key-string
>] | [oobm]
Adds a server and optionally assigns
a server-
specific encryption key. If the switch is configured to
access multiple servers having different encryp-
tion keys, you can configure the switch to use different
encryption keys for different servers.
[no] tacacs-server host <
ip-addr
>
Removes a server assignment (including its
server-specific encryption key, if any).
tacacs-server key <
key-string
>
Configures an optional global encryption key
.
Keys
configured in the switch must exactly match the
encryption keys configured in the servers that
the switch will attempt to use for authentication.
[no] tacacs-server key
Removes the optional global encryption key. (Does not
affect any server-specific encryption key assignments.)
tacacs-server timeout < 1-255 >
Changes the wait period for a TACACS server response.
(Default: 5 seconds.)
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......