Cisco Cisco IOS Software Release 12.2(27)SBC

ページ / 32
RADIUS-Based Lawful Intercept
  server-key
22
Cisco IOS Security Configuration Guide
server-key
To configure the RADIUS key to be shared between a device and RADIUS clients, use the server-key 
command in dynamic authorization local server configuration mode. To remove this configuration, use 
the no form of this command.
server-key [0 | 7word 
no server-key [0 | 7word 
Syntax Description
Command Default
A server key is not configured.
Command Modes
Dynamic authorization local server configuration
Command History
Usage Guidelines
A device (such as a router) can be configured to allow an external policy server to dynamically send 
updates to the router. This functionality is facilitated by the CoA RADIUS extension. CoA introduced 
peer-to-peer capability to RADIUS, enabling a router and external policy server each to act as a RADIUS 
client and server. Use the server-key command to configure the key to be shared between the ISG and 
RADIUS clients.
Examples
The following example configures “cisco” as the shared server key:
aaa server radius dynamic-author
client 10.0.0.1 
server-key cisco
Related Commands
0
(Optional) An unencrypted key will follow.
7
(Optional) A hidden key will follow.
word
Unencrypted server key.
Release
Modification
12.2(28)SB
This command was introduced.
Command
Description
aaa server radius dynamic-author
Configures a device as a AAA server to facilitate interaction 
with an external policy server.