HP 6125XLG R2306-HP 6125XLG Blade Switch Security Command Reference - Page 79

secondary authorization, cipher, simple, vpn-instance, ipv4-address, port-number, string

Page 79 highlights

Syntax secondary authorization { ipv4-address | ipv6 ipv6-address } [ port-number I key { cipher | simple } string | vpn-instance vpn-instance-name ] * undo secondary authorization [ { ipv4-address | ipv6 ipv6-address } [ port-number | vpn-instance vpn-instance-name ]* ] Default No secondary HWTACACS authorization server is specified. Views HWTACACS scheme view Predefined user roles network-admin Parameters ipv4-address: Specifies the IPv4 address of the secondary HWTACACS authorization server. ipv6 ipv6-address: Specifies the IPv6 address of the secondary HWTACACS authorization server. port-number: Specifies the service port number of the secondary HWTACACS authorization server, a TCP port number in the range of 1 to 65535. The default setting is 49. key { cipher | simple } string: Sets the shared key for secure communication with the secondary HWTACACS authorization server. • cipher string: Sets a ciphertext shared key. The string argument is case sensitive. { In non-FIPS mode, the key is a string of 1 to 373 characters. { In FIPS mode, the key is a string of 15 to 373 characters. • simple string: Sets a plaintext shared key. The string argument is case sensitive. { In non-FIPS mode, the key is a string of 1 to 255 characters. { In FIPS mode, the key is a string of 15 to 255 characters and must contain numbers, uppercase letters, lowercase letters, and special characters. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the secondary HWTACACS authorization server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the server is on the public network, do not specify this option. Usage guidelines Make sure that the port number and shared key settings of the secondary HWTACACS authorization server are the same as those configured on the server. You can configure up to 16 secondary HWTACACS authorization servers for an HWTACACS scheme. With the configuration, if the primary server fails, the device looks for a secondary server in active state (a secondary HWTACACS authorization server configured earlier has a higher priority) and tries to communicate with it. If you use the undo secondary authorization command without specifying any parameter, the command removes all secondary authorization servers. Two authorization servers specified for a scheme, primary or secondary, cannot have identical IP address, port number, and VPN settings. 70

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321

70
Syntax
secondary authorization
{
ipv4-address
|
ipv6
ipv6-address
} [
port-number
I
key
{
cipher
|
simple
}
string
|
vpn-instance
vpn-instance-name
] *
undo secondary authorization
[
{
ipv4-address
|
ipv6
ipv6-address
} [
port-number
|
vpn-instance
vpn-instance-name
]*
]
Default
No secondary HWTACACS authorization server is specified.
Views
HWTACACS scheme view
Predefined user roles
network-admin
Parameters
ipv4-address
: Specifies the IPv4 address of the secondary HWTACACS authorization server.
ipv6
ipv6-address
: Specifies the IPv6 address of the secondary HWTACACS authorization server.
port-number
: Specifies the service port number of the secondary HWTACACS authorization server, a
TCP port number in the range of 1 to 65535. The default setting is 49.
key
{
cipher
|
simple
}
string
: Sets the shared key for secure communication with the secondary
HWTACACS authorization server.
cipher
string
: Sets a ciphertext shared key. The
string
argument is case sensitive.
{
In non-FIPS mode, the key is a string of 1 to 373 characters.
{
In FIPS mode, the key is a string of 15 to 373 characters.
simple
string
: Sets a plaintext shared key. The
string
argument is case sensitive.
{
In non-FIPS mode, the key is a string of 1 to 255 characters.
{
In FIPS mode, the key is a string of 15 to 255 characters and must contain numbers, uppercase
letters, lowercase letters, and special characters.
vpn-instance
vpn-instance-name
: Specifies the MPLS L3VPN to which the secondary HWTACACS
authorization server belongs, where
vpn-instance-name
is a case-sensitive string of 1 to 31 characters. If
the server is on the public network, do not specify this option.
Usage guidelines
Make sure that the port number and shared key settings of the secondary HWTACACS authorization
server are the same as those configured on the server.
You can configure up to 16 secondary HWTACACS authorization servers for an HWTACACS scheme.
With the configuration, if the primary server fails, the device looks for a secondary server in active state
(a secondary HWTACACS authorization server configured earlier has a higher priority) and tries to
communicate with it.
If you use the
undo secondary authorization
command without specifying any parameter, the command
removes all secondary authorization servers.
Two authorization servers specified for a scheme, primary or secondary, cannot have identical IP address,
port number, and VPN settings.