Configuring Tacacs+ Server Groups - Cisco Nexus 9000 Series Configuration Manual

Nx-os security configuration guide, release 9.x
Hide thumbs Also See for Nexus 9000 Series:
Table of Contents

Advertisement

Configuring TACACS+
Command or Action
Step 2
tacacs-server host {ipv4-address | ipv6-address |
host-name} key [0 | 6 | 7] key-value
Example:
switch(config)# tacacs-server host 10.10.1.1 key
0 PlIjUhYg
Example:
switch(config)# tacacs-server host 10.10.1.1 key
7 "fewhg"
Step 3
exit
Example:
switch(config)# exit
switch#
Step 4
(Optional) show tacacs-server
Example:
switch# show tacacs-server
Step 5
(Optional) copy running-config startup-config
Example:
switch# copy running-config startup-config
Related Topics

Configuring TACACS+ Server Groups

You can specify one or more remote AAA servers to authenticate users using server groups. All members of
a group must belong to the TACACS+ protocol. The servers are tried in the same order in which you configure
them.
You can configure these server groups at any time but they only take effect when you apply them to an AAA
service.
Before you begin
Enable TACACS+.
About AES Password Encryption and Master Encryption
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
Configuring TACACS+ Server Groups
Purpose
Specifies a secret key for a specific TACACS+ server. You
can specify that the key-value is in clear text format (0), is
type-6 encrypted (6), or is type-7 encrypted (7). The Cisco
NX-OS software encrypts a clear text key before saving it
to the running configuration. The default format is clear
text. The maximum length is 63 characters.
This secret key is used instead of the global secret key.
If you already configured a shared secret using
Note
the generate type7_encrypted_secret
command, enter it in quotation marks, as shown
in the second example. For more information,
see
Configuring the Shared Secret for RADIUS
or TACACS+, on page
Exits configuration mode.
Displays the TACACS+ server configuration.
The secret keys are saved in encrypted form in
Note
the running configuration. Use the show
running-config command to display the
encrypted secret keys.
Copies the running configuration to the startup
configuration.
Keys, on page 413
33.
77

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents