Configuring A Key For A Specific Tacacs+ Server - Cisco Nexus 9000 Series Configuration Manual

Nx-os security configuration guide, release 9.x
Hide thumbs Also See for Nexus 9000 Series:
Table of Contents

Advertisement

Configuring a Key for a Specific TACACS+ Server

Command or Action
Step 3
exit
Example:
switch(config)# exit
switch#
Step 4
(Optional) show tacacs-server
Example:
switch# show tacacs-server
Step 5
(Optional) copy running-config startup-config
Example:
switch# copy running-config startup-config
Related Topics
Configuring a Key for a Specific TACACS+ Server
You can configure secret keys for a TACACS+ server. A secret key is a shared secret text string between the
Cisco NX-OS device and the TACACS+ server host.
Before you begin
Enable TACACS+.
Obtain the secret key values for the remote TACACS+ servers.
SUMMARY STEPS
1. configure terminal
2. tacacs-server host {ipv4-address | ipv6-address | host-name} key [0 | 6 | 7] key-value
3. exit
4. (Optional) show tacacs-server
5. (Optional) copy running-config startup-config
DETAILED STEPS
Command or Action
Step 1
configure terminal
Example:
switch# configure terminal
switch(config)#
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
76
Enabling TACACS+
, on page 73
About AES Password Encryption and Master Encryption
Purpose
Exits configuration mode.
Displays the TACACS+ server configuration.
The secret keys are saved in encrypted form in
Note
the running configuration. Use the show
running-config command to display the
encrypted secret keys.
Copies the running configuration to the startup
configuration.
Keys, on page 413
Purpose
Enters global configuration mode.
Configuring TACACS+

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents