232 CHAPTER 9: AAA AND RADIUS OPERATION
As aforementioned, HWTACACS protocol is configured scheme by scheme.
Therefore, you must create a HWTACACS scheme and enter HWTACACS view
before you perform other configuration tasks.
Perform the following configuration in system view.
Table 2-37 Creating a HWTACACS scheme
OperationCommand
Create a HWTACACS scheme and enter HWTACACS view.hwtacacs scheme
hwtacacs-scheme-name
Delete a HWTACACS scheme.undo hwtacacs scheme hwtacacs-scheme-name
By default, no HWTACACS scheme exists.
If the HWTACACS scheme you specify does not exist, the system creates it and
enters HWTACACS view.
The system supports up to 16 HWTACACS schemes. You can only delete the
schemes that are not being used.
2.4.3 Configuring HWTACACS Authentication Servers
Perform the following configuration in HWTACACS view.
Table 2-38 Configuring HWTACACS authentication servers
OperationCommand
Configure the HWTACACS primary authentication server.primary authentication
ip-address [ port ]
Delete the HWTACACS primary authentication server.undo primary authentication
Configure the HWTACACS secondary authentication server.secondary
authentication ip-address [ port ]
Delete the HWTACACS secondary authentication server.undo secondary
authentication
The primary and secondary authentication servers cannot use the same IP address.
The default port number is 49.
If you execute this command repeatedly, the new settings will replace the old
settings.
The authentication server can be deleted only when there is no active TCP
connection used for sending authentication packets.