EasyManua.ls Logo

Cisco Nexus 9000 Series - Configuring a Key for a Specific TACACS+ Server

Cisco Nexus 9000 Series
562 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
PurposeCommand or Action
Exits configuration mode.exit
Example:
Step 3
switch(config)# exit
switch#
Displays the TACACS+ server configuration.(Optional) show tacacs-server
Step 4
Example:
The secret keys are saved in encrypted form in
the running configuration. Use the show
running-config command to display the
encrypted secret keys.
Note
switch# show tacacs-server
Copies the running configuration to the startup
configuration.
(Optional) copy running-config startup-config
Example:
Step 5
switch# copy running-config startup-config
Related Topics
Enabling TACACS+ , on page 73
About AES Password Encryption and Master Encryption Keys, on page 413
Configuring a Key for a Specific TACACS+ Server
You can configure secret keys for a TACACS+ server. A secret key is a shared secret text string between the
Cisco NX-OS device and the TACACS+ server host.
Before you begin
Enable TACACS+.
Obtain the secret key values for the remote TACACS+ servers.
SUMMARY STEPS
1. configure terminal
2. tacacs-server host {ipv4-address | ipv6-address | host-name} key [0 | 6 | 7] key-value
3. exit
4. (Optional) show tacacs-server
5. (Optional) copy running-config startup-config
DETAILED STEPS
PurposeCommand or Action
Enters global configuration mode.configure terminal
Example:
Step 1
switch# configure terminal
switch(config)#
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
76
Configuring TACACS+
Configuring a Key for a Specific TACACS+ Server

Table of Contents

Other manuals for Cisco Nexus 9000 Series

Related product manuals