Key (Hwtacacs Scheme View) - HPE FlexNetwork HSR6800 Security Command Reference

Hide thumbs Also See for FlexNetwork HSR6800:
Table of Contents

Advertisement

Parameters
hwtacacs-scheme-name: HWTACACS scheme name, a case-insensitive string of 1 to 32
characters.
Usage guidelines
An HWTACACS scheme can be referenced by more than one ISP domain at the same time.
An HWTACACS scheme referenced by ISP domains cannot be removed.
Examples
# Create an HWTACACS scheme named hwt1, and enter HWTACACS scheme view.
<Sysname> system-view
[Sysname] hwtacacs scheme hwt1
[Sysname-hwtacacs-hwt1]

key (HWTACACS scheme view)

Use key to set the shared key for secure HWTACACS authentication, authorization, or accounting
communication.
Use undo key to remove the configuration.
Syntax
key { accounting | authentication | authorization } [ cipher | simple ] key
undo key { accounting | authentication | authorization }
Default
No shared key is configured.
Views
HWTACACS scheme view
Default command level
2: System level
Parameters
accounting: Sets the shared key for secure HWTACACS accounting communication.
authentication: Sets the shared key for secure HWTACACS authentication communication.
authorization: Sets the shared key for secure HWTACACS authorization communication.
cipher: Sets a ciphertext shared key.
simple: Sets a plaintext shared key.
key: Specifies the shared key string. This argument is case sensitive. If simple is specified, it must
be a string of 1 to 255 characters. If cipher is specified, it must be a ciphertext string of 1 to 373
characters. If neither cipher nor simple is specified, you set a plaintext shared key string. In FIPS
mode, the shared key must be a string of at least 8 characters that contain numbers, uppercase
letters, lowercase letters, and special characters.
Usage guidelines
The shared keys configured on the device must match those configured on the HWTACACS servers.
For secrecy, all shared keys, including keys configured in plain text, are saved in cipher text.
In FIPS mode, the shared key is encrypted and decrypted by using 3DES.
91

Advertisement

Table of Contents
loading

Table of Contents