Connectivity Guide

Table Of Contents
key 9 authentication-key — Enter an authentication key in encrypted format. . A maximum of 128
characters.
authentication-key — Enter an authentication in plain text. . A maximum of 42 characters. It is not
necessary to enter
0 before the key.
key authentication-key — Enter a text string for the encryption key used to authenticate the switch
on the TACACS+ server. A maximum of 42 characters.
Default Not congured
Command Mode CONFIGURATION
Usage Information The authentication key must match the key congured on the TACACS+ server. You cannot enter spaces in the
key. The show running-configuration output displays both unencrypted and encrypted keys in encrypted
format. Congure the global timeout allowed for authentication requests on TACACS+ servers using the tacacs-
server timeout
command. By default, OS10 times out an authentication attempt on a TACACS+ server after
ve seconds. The no version of this command removes a TACACS+ server conguration.
Example
OS10(config)# tacacs-server host 1.5.6.4 key secret1
Supported Releases 10.4.0E(R2) or later
tacacs-server timeout
Congures the global timeout used for authentication attempts on TACACS+ servers.
Syntax
tacacs-server timeout seconds
Parameters seconds — Enter the timeout period used to wait for an authentication response from a TACACS+ server, from 1
to 1000 seconds.
Default 5 seconds
Command Mode CONFIGURATION
Usage Information The no version of this command resets the TACACS+ server timeout to the default.
Example
OS10(config)# tacacs-server timeout 360
Supported Releases 10.4.0E(R2) or later
username password role
Creates an authentication entry based on a user name and password, and assigns a role to the user.
Syntax
username username password password role role
Parameters
username username — Enter a text string. A maximum of 32 alphanumeric characters; 1 character
minimum.
password password — Enter a text string. A maximum of 32 alphanumeric characters; 9 characters
minimum.
role role — Enter a user role:
sysadmin — Full access to all commands in the system, exclusive access to commands that manipulate
the le system, and access to the system shell. A system administrator can create user IDs and user roles.
secadmin — Full access to conguration commands that set security policy and system access, such as
password strength, AAA authorization, and cryptographic keys. A security administrator can display security
information, such as cryptographic keys, login statistics, and log information.
636 System management