HP GbE2c HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Command Refere - Page 94

TACACS+ server configuration, secret2 &lt, telnet enable|disable

Page 94 highlights

The following table describes the RADIUS Server Configuration Menu options. Table 81 RADIUS Server Configuration Menu options Command Description prisrv secsrv secret secret2 port retries timeout telnet enable|disable secbd enable|disable on off cur Sets the primary RADIUS server address. Sets the secondary RADIUS server address. This is the shared secret between the switch and the RADIUS server(s). This is the secondary shared secret between the switch and the RADIUS server(s). Enter the number of the User Datagram Protocol (UDP) port to be configured, between 1500-3000. The default is 1645. Sets the number of failed authentication requests before switching to a different RADIUS server. The range is 1-3 requests The default is 3 requests. Sets the amount of time, in seconds, before a RADIUS server authentication attempt is considered to have failed. The range is 1-10 seconds. The default is 3 seconds. Enables or disables the RADIUS back door for telnet/SSH/ HTTP/HTTPS. This command does not apply when secure backdoor (secbd) is enabled. Enables or disables the RADIUS back door using secure password for telnet/SSH/ HTTP/HTTPS. This command does not apply when backdoor (telnet) is enabled. Enables the RADIUS server. Disables the RADIUS server. This is the default. Displays the current RADIUS server parameters. IMPORTANT: If RADIUS is enabled, you must login using RADIUS authentication when connecting via the console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can connect using noradius and the administrator password even if the backdoor (telnet) or secure backdoor (secbd) are disabled. If Telnet backdoor is enabled (telnet ena), type in noradius as a backdoor to bypass RADIUS checking, and use the administrator password to log into the switch. The switch allows this even if RADIUS servers are available. If secure backdoor is enabled (secbd ena), type in noradius as a backdoor to bypass RADIUS checking, and use the administrator password to log into the switch. The switch allows this only if RADIUS servers are not available. TACACS+ server configuration Command: /cfg/sys/tacacs+ [TACACS+ Server Menu] prisrv - Set IP address of primary TACACS+ server secsrv - Set IP address of secondary TACACS+ server secret - Set secret for primary TACACS+ server secret2 - Set secret for secondary TACACS+ server port - Set TACACS+ port number retries - Set number of TACACS+ server retries timeout - Set timeout value of TACACS+ server retries telnet - Enable/disable TACACS+ back door for telnet/ssh/http/https secbd - Enable/disable TACACS+ secure backdoor for telnet/ssh/http/https cmap - Enable/disable TACACS+ new privilege level mapping usermap - Set user privilege mappings on - Enable TACACS+ authentication off - Disable TACACS+ authentication cur - Display current TACACS+ settings Configuration Menu 94

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Configuration Menu 94
The following table describes the RADIUS Server Configuration Menu options.
Table 81
RADIUS Server Configuration Menu options
Command
Description
prisrv <
IP address
>
Sets the primary RADIUS server address.
secsrv <
IP address
>
Sets the secondary RADIUS server address.
secret <
1-32 characters
>
This is the shared secret between the switch and the RADIUS server(s).
secret2 <
1-32 characters
>
This is the secondary shared secret between the switch and the RADIUS
server(s).
port <
UDP port number
>
Enter the number of the User Datagram Protocol (UDP) port to be
configured, between 1500-3000. The default is 1645.
retries <
1-3
>
Sets the number of failed authentication requests before switching to a
different RADIUS server. The range is 1-3 requests The default is 3
requests.
timeout <
1-10
>
Sets the amount of time, in seconds, before a RADIUS server
authentication attempt is considered to have failed. The range is 1-10
seconds. The default is 3 seconds.
telnet enable|disable
Enables or disables the RADIUS back door for telnet/SSH/ HTTP/HTTPS.
This command does not apply when secure backdoor (
secbd
) is
enabled.
secbd enable|disable
Enables or disables the RADIUS back door using secure password for
telnet/SSH/ HTTP/HTTPS. This command does not apply when backdoor
(
telnet
) is enabled.
on
Enables the RADIUS server.
off
Disables the RADIUS server. This is the default.
cur
Displays the current RADIUS server parameters.
IMPORTANT:
If RADIUS is enabled, you must login using RADIUS authentication when connecting via the
console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can connect using
noradius and the administrator password even if the backdoor (
telnet
) or secure backdoor (
secbd
) are
disabled.
If Telnet backdoor is enabled (
telnet ena
), type in
noradius
as a backdoor to bypass RADIUS checking,
and use the administrator password to log into the switch. The switch allows this even if RADIUS servers are
available.
If secure backdoor is enabled (
secbd ena
), type in
noradius
as a backdoor to bypass RADIUS checking,
and use the administrator password to log into the switch. The switch allows this only if RADIUS servers are not
available.
TACACS+ server configuration
Command:
/cfg/sys/tacacs+
[TACACS+ Server Menu]
prisrv
- Set IP address of primary TACACS+ server
secsrv
- Set IP address of secondary TACACS+ server
secret
- Set secret for primary TACACS+ server
secret2 - Set secret for secondary TACACS+ server
port
- Set TACACS+ port number
retries - Set number of TACACS+ server retries
timeout - Set timeout value of TACACS+ server retries
telnet
- Enable/disable TACACS+ back door for telnet/ssh/http/https
secbd
- Enable/disable TACACS+ secure backdoor for telnet/ssh/http/https
cmap
- Enable/disable TACACS+ new privilege level mapping
usermap - Set user privilege mappings
on
- Enable TACACS+ authentication
off
- Disable TACACS+ authentication
cur
- Display current TACACS+ settings