Netgear M5300-52G3 Web Management User Guide - Page 366
Authentication List Configuration, Login Authentication List
View all Netgear M5300-52G3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 366 highlights
ProSafe M5300 Switch To configure TACACS+ server settings: 1. Use TACACS+ Server to enter the configured TACACS+ server IP address. 2. Use Priority to specify the order in which the TACACS+ servers are used. It should be within the range 0-65535. 3. Use Port to specify the authentication port. It should be within the range 0-65535. 4. Use Key String to specify the authentication and encryption key for TACACS+ communications between the device and the TACACS+ server. The valid range is 0-128 characters. The key must match the encryption used on the TACACS+ server. 5. Use Connection Timeout to specify the amount of time that passes before the connection between the device and the TACACS+ server time out. The range is between 1-30. 6. Click ADD to add a new server to the switch. This button is only available to READWRITE users. These changes will not be retained across a power cycle unless a save is performed. 7. Click DELETE to delete the selected server from the configuration. Authentication List Configuration The Authentication List folder contains links to the following features: • Login Authentication List on page 366 • Enable Authentication List on page 367 • Dot1x Authentication List on page 369 • HTTP Authentication List on page 369 • HTTPS Authentication List on page 370 Login Authentication List You use this page to configure login lists. A login list specifies the authentication method(s) you want to be used to validate switch or port access for the users associated with the list. The pre-configured users, admin and guest, are assigned to a pre-configured list named defaultList, which you may not delete. All newly created users are also assigned to the defaultList until you specifically assign them to a different list To display the Login Authentication List page, click Security Management Security > Authentication List Login Authentication List. Managing Device Security 366