Cisco Cisco IOS Software Release 12.2(27)SBC
RADIUS-Based Lawful Intercept
server-key
22
Cisco IOS Security Configuration Guide
server-key
To configure the RADIUS key to be shared between a device and RADIUS clients, use the server-key
command in dynamic authorization local server configuration mode. To remove this configuration, use
the no form of this command.
command in dynamic authorization local server configuration mode. To remove this configuration, use
the no form of this command.
server-key [0 | 7] word
no server-key [0 | 7] word
Syntax Description
Command Default
A server key is not configured.
Command Modes
Dynamic authorization local server configuration
Command History
Usage Guidelines
A device (such as a router) can be configured to allow an external policy server to dynamically send
updates to the router. This functionality is facilitated by the CoA RADIUS extension. CoA introduced
peer-to-peer capability to RADIUS, enabling a router and external policy server each to act as a RADIUS
client and server. Use the server-key command to configure the key to be shared between the ISG and
RADIUS clients.
updates to the router. This functionality is facilitated by the CoA RADIUS extension. CoA introduced
peer-to-peer capability to RADIUS, enabling a router and external policy server each to act as a RADIUS
client and server. Use the server-key command to configure the key to be shared between the ISG and
RADIUS clients.
Examples
The following example configures “cisco” as the shared server key:
aaa server radius dynamic-author
client 10.0.0.1
server-key cisco
Related Commands
0
(Optional) An unencrypted key will follow.
7
(Optional) A hidden key will follow.
word
Unencrypted server key.
Release
Modification
12.2(28)SB
This command was introduced.
Command
Description
aaa server radius dynamic-author
Configures a device as a AAA server to facilitate interaction
with an external policy server.
with an external policy server.