HP FlexFabric 7900 Series Command Reference Manual page 73

Security
Hide thumbs Also See for FlexFabric 7900 Series:
Table of Contents

Advertisement

undo secondary authorization [ ipv4-address [ port-number ] ]
Default
No secondary HWTACACS authorization server is specified.
Views
HWTACACS scheme view
Predefined user roles
network-admin
Parameters
ipv4-address: Specifies the IPv4 address of the secondary HWTACACS authorization server.
port-number: Specifies the service port number of the secondary HWTACACS authorization server, a
TCP port number in the range of 1 to 65535. The default setting is 49.
key { cipher | simple } string: Sets the shared key for secure communication with the secondary
HWTACACS authorization server.
cipher string: Sets a ciphertext shared key. The string argument is case sensitive.
In non-FIPS mode, the key is a string of 1 to 373 characters.
In FIPS mode, the key is a string of 15 to 373 characters.
simple string: Sets a plaintext shared key. The string argument is case sensitive.
In non-FIPS mode, the key is a string of 1 to 255 characters.
In FIPS mode, the key is a string of 15 to 255 characters and must contain digits, uppercase
letters, lowercase letters, and special characters.
single-connection: The device and the secondary HWTACACS authorization server use the same TCP
connection to exchange all authorization packets for all users. If you do not specify this keyword, the
device establishes a new TCP connection each time it exchanges authorization packets with the
secondary authorization server for a user. If the HWTACACS server supports the single-connection
method, HP recommends that you specify this keyword to reduce TCP connections for improving system
performance.
Usage guidelines
Make sure that the port number and shared key settings of the secondary HWTACACS authorization
server are the same as those configured on the server.
You can configure up to 16 secondary HWTACACS authorization servers for an HWTACACS scheme.
If the primary server fails, the device tries to communicate with a secondary server in active state. The
device connects to the secondary servers in the order they are configured.
If you use the undo secondary authorization command without specifying any parameter, the command
removes all secondary authorization servers.
Two authorization servers specified for a scheme, primary or secondary, cannot have identical IP address
and port number settings.
You can remove an authorization server only when it is not used for user authorization. Removing an
authorization server affects only authorization processes that occur after the remove operation.
For security purposes, all shared keys, including shared keys configured in plain text, are saved in
ciphertext.
66

Advertisement

Table of Contents
loading

Table of Contents