Tacacs+ Encryption Key Authentication - ProCurve 2900 Manual

Table of Contents

Advertisement

about how to use 802.1X on the switch both as an authenticator and a
supplicant, see "Configuring Port-Based and Client-Based Access Control
(802.1X)" in this guide.
The local password configured with the password command is no longer
accepted as an 802.1X authenticator credential. A new configuration
command (password port-access) is introduced to configure the local operator
username and password used as 802.1X authentication credentials for access
to the switch.
The password port-access values are now configured separately from the
manager and operator passwords configured with the password manager and
password operator commands and used for management access to the switch.
For information on the new password command syntax, see "Password
Command Options" on page 2-13.
After you enter the complete password port-access command syntax, the
password is set. You are not prompted to enter the password a second time.

TACACS+ Encryption Key Authentication

You can use TACACS+ servers to authenticate users who request access to a
switch through Telnet (remote) or console (local) sessions. TACACS+ uses
an authentication hierarchy consisting of:
Remote passwords assigned in a TACACS+ server
Local manager and operator passwords configured on the switch.
When you configure TACACS+, the switch first tries to contact a designated
TACACS+ server for authentication services. If the switch fails to connect to
any TACACS+ server, it defaults to its own locally assigned passwords for
authentication control if it has been configured to do so.
For improved security, you can configure a global or server-specific
encryption key that encrypts data in TACACS+ packets transmitted between
a switch and a RADIUS server during authentication sessions. The key
configured on the switch must match the encryption key configured in each
TACACS+ server application. (The encryption key is sometimes referred to
as "shared secret" or "secret" key.) For more information, see "TACACS+
Authentication" on page 4-1 in this guide.
TACACS+ shared secret (encryption) keys can be saved in a configuration file
by entering this command:
ProCurve(config)# tacacs-server key <keystring>
Configuring Username and Password Security
Saving Security Credentials in a Config File
2-15

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Procurve switch 2900-24gProcurve switch 2900-48g

Table of Contents