Dell PowerSwitch S4128F-ON OS10 Enterprise Edition User Guide Release 10.4.1.0 - Page 540
tacacs-server timeout, username password role
View all Dell PowerSwitch S4128F-ON manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 540 highlights
• authentication-key - Enter an authentication in plain text (up to 42 characters). It is not necessary to enter 0 before the key. • key authentication-key - Enter a text string for the encryption key used to authenticate the switch on the TACACS+ server (up to 42 characters). Default Command Mode Usage Information Example Not configured CONFIGURATION The authentication key must match the key configured on the TACACS+ server. You cannot enter spaces in the key. The show running-configuration output displays both unencrypted and encrypted keys in encrypted format. Configure the global timeout allowed for authentication requests on TACACS+ servers by using the tacacs-server timeout command. By default, OS10 times out an authentication attempt on a TACACS+ server after five seconds. The no version of this command removes a TACACS+ server configuration. OS10(config)# tacacs-server host 1.5.6.4 key secret1 Supported Releases 10.4.0E(R2) or later tacacs-server timeout Configures the global timeout used for authentication attempts on TACACS+ servers. Syntax Parameters Default Command Mode Usage Information Example tacacs-server timeout seconds seconds - Enter the timeout period used to wait for an authentication response from a TACACS+ server (1 to 1000 seconds). 5 seconds CONFIGURATION The no version of this command resets the TACACS+ server timeout to the default. OS10(config)# tacacs-server timeout 360 Supported Releases 10.4.0E(R2) or later username password role Creates an authentication entry based on a user name and password, and assigns a role to the user. Syntax username username password password role role Parameters • username username - Enter a text string (up to 32 alphanumeric characters; 1 character minimum). • password password - Enter a text string (up to 32 alphanumeric characters; 9 characters minimum). • role role - Enter a user role: - sysadmin - Full access to all commands in the system, exclusive access to commands that manipulate the file system, and access to the system shell. A system administrator can create user IDs and user roles. - secadmin - Full access to configuration commands that set security policy and system access, such as password strength, AAA authorization, and cryptographic keys. A security administrator can display security information, such as cryptographic keys, login statistics, and log information. - netadmin - Full access to configuration commands that manage traffic flowing through the switch, such as routes, interfaces, and ACLs. A network administrator cannot access configuration commands for security features or view security information. 540 System management