Netgear GS110TP GS108T/ GS110TP Smart Switch Software Administration Manual - Page 155

Authentication List Configuration, Priority, Key String, Connection Timeout, Apply, TACACS, Server

Page 155 highlights

GS108T and GS110TP Smart Switch Software Administration Manual 2. In the Priority field, specify the order in which the TACACS+ servers are used. A value of 0 is the highest priority. 3. In the Port field, specify the authentication port number through which the TACACS+ session occurs. The default is port 49, and the range is 0-65535. 4. In the Key String field, specify the authentication and encryption key for TACACS+ communications between the GS108T or GS110TP and the TACACS+ server. This key must match the encryption used on the TACACS+ server. The valid range is 0-128 characters. 5. In the Connection Timeout field, specify the amount of time that passes before the connection between the device and the TACACS+ server times out. The field range is from 1 to 30 seconds. 6. If you make changes to the page, or add a new entry, click Apply to apply the changes to the system. 7. To delete a configured TACACS+ server, select the IP address of the server from the TACACS+ Server drop down menu, and then click Delete. Authentication List Configuration Use the Authentication List page to configure the default login list. A login list specifies one or more authentication methods to validate switch or port access for the admin user. Note: Admin is the only user on the system and is assigned to a preconfigured list named defaultList, which you cannot delete. To access the Authentication List page, click Security  Management Security, and then click the Authentication List link. To change the authentication method for the defaultList: 1. Select the check box next to the defaultList name Chapter 5: Managing Device Security | 155

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269

Chapter 5:
Managing Device Security
|
155
GS108T and GS110TP Smart Switch Software Administration Manual
2.
In the
Priority
field, specify the order in which the TACACS+ servers are used. A value of 0
is the highest priority.
3.
In the
Port
field, specify the authentication port number through which the TACACS+
session occurs. The default is port 49, and the range is 0–65535.
4.
In the
Key String
field, specify the authentication and encryption key for TACACS+
communications between the GS108T or GS110TP and the TACACS+ server. This key
must match the encryption used on the TACACS+ server. The valid range is 0–128
characters.
5.
In the
Connection Timeout
field, specify the amount of time that passes before the
connection between the device and the TACACS+ server times out. The field range is from
1 to 30 seconds.
6.
If you make changes to the page, or add a new entry, click
Apply
to apply the changes to
the system.
7.
To delete a configured TACACS+ server, select the IP address of the server from the
TACACS+
Server
drop down menu, and then click
Delete
.
Authentication List Configuration
Use the Authentication List page to configure the default login list. A login list specifies one or
more authentication methods to validate switch or port access for the
admin
user.
Note:
Admin
is the only user on the system and is assigned to a
preconfigured list named defaultList, which you cannot delete.
To access the Authentication List page, click
Security
Management Security, and then
click the Authentication List
link.
To change the authentication method for the defaultList:
1.
Select the check box next to the defaultList name