Dell Networking 2024 Reference Manual page 772

Hide thumbs Also See for Networking 2024:
Table of Contents

Advertisement

port
priority
show tacacs
key
Use the key command in TACACS Configuration mode to specify the
authentication and encryption key for all TACACS communications between
the device and the TACACS server. This key must match the key used on the
TACACS daemon.
Syntax
key-string
key [
key-string
Default Configuration
If left unspecified, the key-string parameter defaults to the global value.
Command Mode
TACACS Configuration mode
User Guidelines
This command has no user guidelines.
Example
The following example specifies an encryption and authentication key of 12.
console(tacacs)#key 12
key encrypted
Use the key encrypted command to configure an encrypted key that is shared
with the TACACS server. Use the no form of the command to remove the key.
Syntax
key encrypted
772
TACACS+ Commands
]
— To specify the key name. (Range: 1 – 128 characters)
key-string
tacacs-server key encrypted
tacacs-server timeout
timeout

Advertisement

Table of Contents
loading

Table of Contents