4-19
Authentication
Configuring on the Switch
N o t e o n
E n c r y p t i o n K e y s
Encryption keys configured in the switch must exactly match the encryption
keys configured in servers the switch will attempt to use for
authentication.
If you configure a global encryption key, the switch uses it only with servers
for which you have not also configured a server-specific key. Thus, a global
key is more useful where the servers you are using all have an
identical key, and server-specific keys are necessary where different
servers have different keys.
If server “X” does not have an encryption key assigned for the
switch, then configuring either a global encryption key or a server-specific key
in the switch for server “X” will block authentication support from server “X”.
Syntax:
tacacs-server host <
ip-addr
>
[key <
key-string
>]
Adds a server and optionally assigns
a server-
specific encryption key.
[no] tacacs-server host <
ip-addr
>
Removes a server assignment (including its
server-specific encryption key, if any).
tacacs-server key <
key-string
>
Enters the optional global encryption key.
[no] tacacs-server key
Removes the optional global encryption key. (Does not
affect any server-specific encryption key assignments.)
tacacs-server timeout < 1-255 >
Changes the wait period for a TACACS server response.
(Default: 5 seconds.)
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......