9-20
Using Passwords and To Protect Against Unauthorized Access
Authentication for Central Control of Switch Access Security
Usi
n
g P
a
ssword
s a
nd
T
A
CA
CS
+
Syntax:
tacacs-server host <
ip-addr
>
Adds a server and optionally
[key <key-string>]
assigns a
server-specific
encryption key.
[no] tacacs-server host <
ip-addr
>
Removes a server
assignment (including its server-
specific encryption key, if any)
.
tacacs-server key <
key-string
>
Enters the optional
global encryption key
.
[no] tacacs-server key
Removes the optional global encryption
key. (Does not affect any server-specific
encryption key assignments.)
tacacs-server timeout <1 . . 255>
Changes the wait period for a TACACS
server response. (Default: 5 seconds.)
N o t e o n
E n c r y p t i o n
K e ys
Encryption keys configured in the switch must exactly match the encryption
keys configured in servers the switch will attempt to use for
authentication.
If you configure a global encryption key, the switch uses it only with servers
for which you have not also configured a server-specific key. Thus, a global
key is more useful where the servers you are using all have an
identical key, and server-specific keys are necessary where different
servers have different keys.
If server “X” does not have an encryption key assigned for the
switch, then configuring either a global encryption key or a server-specific key
in the switch for server “X” will block authentication support from server “X”.
Содержание ProCurve 4108gl Bundle
Страница 1: ...hp procurve switch 4108gl management and configuration guide www hp com go hpprocurve ...
Страница 2: ......
Страница 3: ...HP Procurve Switch 4108GL Management and Configuration Guide Software Release G 01 xx or Later ...
Страница 40: ...2 16 Using the Menu Interface Where To Go From Here Using the Menu Interface ...
Страница 82: ...4 26 Using the HP Web Browser Interface Status Reporting Features Using the HP Web Browser Interface ...
Страница 116: ...6 14 Interface Access and System Information System Information Interface Access and System Information ...
Страница 154: ...8 24 Time Protocols SNTP Messages in the Event Log Time Protocols ...
Страница 230: ...11 32 Optimizing Port Usage Through Traffic Control and Port Trunking Port Trunking Ports Traffic Control and Trunking ...
Страница 350: ...14 44 Port Based Virtual LANs VLANs and GVRP GVRP Port Based Virtual LANs VLANs and GVRP ...
Страница 383: ...16 13 Spanning Tree Protocol STP How STP Operates Spanning Tree Protocol STP ...
Страница 384: ...16 14 Spanning Tree Protocol STP How STP Operates Spanning Tree Protocol STP ...
Страница 442: ...18 30 Troubleshooting Restoring a Flash Image Troubleshooting ...
Страница 466: ...B 6 MAC Address Management Determining MAC Addresses MAC Address Management ...
Страница 470: ......
Страница 481: ...Index 11 Index write memory effect on menu interface 2 13 X Xmodem OS download A 6 ...
Страница 482: ......