Configuring The Shared Secret For Radius Or Tacacs - Cisco Nexus 9000 Series Configuration Manual

Nx-os security configuration guide, release 9.x
Hide thumbs Also See for Nexus 9000 Series:
Table of Contents

Advertisement

Configuring AAA
Command or Action
Note: Choosing password key in the same line while
configuring user account, password will not be
hidden.
Step 3
(Optional) copy running-config startup-config
Example:
switch(config)# copy running-config startup-config

Configuring the Shared Secret for RADIUS or TACACS+

The shared secret that you configure for remote authentication and accounting between the switch and the
RADIUS or TACACS+ server should be hidden because it is sensitive information. You can use a separate
command to generate an encrypted shared secret for the radius-server [host] key and tacacs-server [host]
key commands. The SHA256 hashing method is used to store the encrypted shared secret.
SUMMARY STEPS
1. configure terminal
2. generate type7_encrypted_secret
3. (Optional) copy running-config startup-config
DETAILED STEPS
Command or Action
Step 1
configure terminal
Example:
switch# configure terminal
Step 2
generate type7_encrypted_secret
Example:
switch(config)# generate type7_encrypted_secret
Type-7 (Vigenere) Encryption,
Use this encrypted secret to configure radius and
tacacs shared secret with key type 7.
Copy complete secret with double quotes.
Enter plain text secret:
Confirm plain text secret:
Type 7 Encrypted secret is : "fewhg"
Step 3
(Optional) copy running-config startup-config
Example:
switch(config)# copy running-config startup-config
Configuring the Shared Secret for RADIUS or TACACS+
Purpose
Copies the running configuration to the startup
configuration.
Purpose
Enters global configuration mode.
Configures the RADIUS or TACACS+ shared secret with
key type 7. You are prompted to enter the shared secret in
plain text twice. The secret is hidden as you enter it. Then
an encrypted version of the secret appears.
You can generate the encrypted equivalent of a
Note
plain-text secret separately and configure the
encrypted shared secret later using the
radius-server [host] key and tacacs-server
[host] key commands.
Copies the running configuration to the startup
configuration.
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
33

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents