EasyManuals Logo

Cisco TrustSec User Manual

Cisco TrustSec
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #95 background imageLoading...
Page #95 background image
7-9
Cisco TrustSec Configuration Guide
OL-22192-01
Chapter 7 Cisco TrustSec Command Summary
cts change-password
cts change-password
To change the password between the local device and the authentication server, use the cts
change-password Privileged EXEC command.
cts change-password server ipv4_address udp_port {a-id hex_string | key radius_key } [source
interface_list ]
Syntax Description
Defaults There is no default for this command.
Command Modes Privileged EXEC (#)
Supported User Roles Administrator
Command Types Use the following command syntax
Command History
Usage Guidelines The cts change-password command allows an administrator to change the password used between the
local device the Cisco Secure ACS authentication server, without having to also reconfigure the
authentication server.
Note The cts change-password is supported on Cisco Secure ACS, 5.1 and more recent versions.
For Catalyst 6500 switches with dual-supervisor chassis, the hardware-based keystores must be
manually synchronized when inserting a second supervisor linecard. A password change process may be
invoked to make both active and standby supervisors have the same device password.
server Specifies the authentication server.
ipv4_address The IP address of the authentication server.
udp_port The UPD port of the authentication server.
a-id hex_string Specifies the identification string of the ACS server
key Specifies the RADIUS key to be used for provisioning
source Specifies the interface for source address in request packets
interface_list Specify the interface type and its identifying parameters per the displayed
list.
Release Modification
12.2(50) SY This command was introduced on the Catalyst 6500 Series Switches.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco TrustSec and is the answer not in the manual?

Cisco TrustSec Specifications

General IconGeneral
CategoryNetwork Security
FunctionalityProvides role-based access control, network segmentation, and policy enforcement.
Key ComponentsSecurity Group Tags (SGT), Security Exchange Protocol (SXP).
Authentication Methods802.1X, MAC Authentication Bypass (MAB), Web Authentication
Security Group Tagging (SGT)Assigns security group tags to users and devices for identity-based segmentation.
Security Exchange Protocol (SXP)A protocol used to propagate SGT information across network devices.
Policy EnforcementEnforces security policies based on SGTs and SGACLs.
BenefitsEnhanced security, simplified policy management, and improved compliance.
EncryptionSupports encryption for data in transit through IPsec and MACsec.
ScalabilityScalable to large enterprise networks with thousands of devices.
CompatibilityCompatible with a wide range of Cisco network devices.
DescriptionCisco TrustSec is a security architecture framework designed to build secure networks. It uses identity-based access control to segment the network and enforce policies based on user roles and device types, rather than relying solely on IP addresses.

Related product manuals