In an HWTACACS server template, you must specify the IP address, port number, and shared key of a specified HWTACACS server. Default configurations are available for the configurations such as configuring whether the user name of the HWTACACS server contains the domain name and configuring the time for the primary server to return to the active state. The user can change the default configurations according to the actual requirements.
Configuring the HWTACACS server template involves the following configurations:
You can use either of the following methods to configure the IP address of the primary/secondary HWTACACS server:
To prevent risks in communication between the device and the HWTACACS server, deploy the communication network between the device and the HWTACACS server in a security zone.
The system view is displayed.
The HWTACACS protocol is enabled.
A HWTACACS service name is configured.
On an HWTACACS server, a user name can be allocated different rights based on different service names. After the hwtacacs-server service-name command is run, a user logging in to the device is allocated a right based on the configured HWTACACS service name.
A default remote address is configured for the communication between the HWTACACS client and server.
When the HWTACACS client interworks with a third-party HWTACACS server, the third-party HWTACACS server may require the rem_addr field. To configure a default remote address for the communication between the HWTACACS client and server, run the hwtacacs-server default remote-address command. If a default remote address is configured and no remote address is carried in the rem_addr field of the authentication, authorization, and accounting request messages to be sent by the HWTACACS client to the server, the default remote address is added to the rem_addr field before the messages are sent.
The HWTACACS server template is created, and the HWTACACS server template view is displayed.
The shared key for the communication with the HWTACACS server is configured.
The shared key can improve the security of the communication between the NetEngine 8000 F and the HWTACACS server.
To ensure the valid identities of both parties, the key on the NetEngine 8000 F must be the same as that configured for the HWTACACS server.
The priority of the HWTACACS common server is higher than that of the HWTACACS authentication/accounting/authorization server. If you configure the common server as the master server, configurations of the other servers (authentication, accounting, and authorization servers) cannot take effect.
Run the following command to configure the address and shared key of the primary/secondary HWTACACS common server.
For IPv4 server: hwtacacs-server ip-address [ port ] [ shared-key { key-string | cipher cipher-string } | mux-mode | { vpn-instance vpn-instance-name | public-net } ] * [ secondary ]
For IPv6 server: hwtacacs-server ipv6-address [ port ] [ shared-key { key-string | cipher cipher-string } | mux-mode | vpn-instance vpn-instance-name ] * [ secondary ]
Configure the addresses and shared keys for the primary/secondary HWTACACS authentication server, HWTACACS authorization server, and HWTACACS accounting server.
For IPv4 server, run hwtacacs-server authentication { ip-address } [ port ] [ shared-key { key-string | cipher cipher-string } | mux-mode | { vpn-instance vpn-instance-name | public-net } ]* [ secondary ]
For IPv6 server, run hwtacacs-server authentication ipv6-address [ port ] [ shared-key { key-string | cipher cipher-string } | mux-mode | vpn-instance vpn-instance-name ] * [ secondary ]
The address and shared key of the primary (secondary) HWTACACS authentication server are configured.
For IPv4 server, run hwtacacs-server authorization { ip-address } [ port ] [ shared-key { key-string | cipher cipher-string } | mux-mode | { vpn-instance vpn-instance-name | public-net } ]* [ secondary ]
For IPv6 server, run hwtacacs-server authorization ipv6-address [ port ] [ shared-key { key-string | cipher cipher-string } | mux-mode | vpn-instance vpn-instance-name ] * [ secondary ]
The address and shared key of the primary (secondary) HWTACACS authorization server are configured.
For IPv4 server, run hwtacacs-server accounting ip-address [ port ] [ shared-key { key-string | cipher cipher-string } | mux-mode | { vpn-instance vpn-instance-name | public-net } ] * [ secondary ]
For IPv6 server, run hwtacacs-server accounting ipv6-address [ port ] [ shared-key { key-string | cipher cipher-string } | mux-mode | vpn-instance vpn-instance-name ] * [ secondary ]
The address and shared key of the primary (secondary) HWTACACS accounting server are configured.
The source IP address for the communication between the device and the HWTACACS server is configured.
The response timeout period of the HWTACACS server is configured.
If the device does not receive any response from the HWTACACS server within the timeout period, it considers that the HWTACACS server is faulty. Then the device tries to perform authentication and authorization by using other methods.
The time for the primary server to return in the active state is specified.
Whether the user name of the HWTACACS server contains the domain name is determined.
If the HWTACACS server does not accept the user name that contains the domain name, you can delete the domain name and then send the user name without the domain name to the HWTACACS server.
The user name is usually in the format of "user name@domain name".
The HWTACACS user password is changed.
The configuration is committed.