Netgear M5300-52G3 Web Management User Guide - Page 367
Enable Authentication List, List Name, Local, Radius, Enable, Tacacs, DELETE, Security
View all Netgear M5300-52G3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 367 highlights
ProSafe M5300 Switch To configure the authentication lists for access to the switch management interface: 1. List Name - If you are creating a new login list, enter the name you want to assign. It can be up to 15 alphanumeric characters long and is not case sensitive. 2. Use the drop-down menu to select the method that should appear first in the selected authentication login list. If you select a method that does not time out as the first method, such as local no other method will be tried, even if you have specified more than one method. The options are: • Local - The user's locally stored ID and password will be used for authentication. • Radius - The user's ID and password will be authenticated using the RADIUS server instead of locally. • Line - The line password will be used for authentication. • Enable - The privileged EXEC password will be used for authentication. • Tacacs - The user's ID and password will be authenticated using the TACACS+ server. • None -The user will not be authenticated. 3. Use the drop down menu to select the method, if any, that should appear second in the selected authentication login list. This is the method that will be used if the first method times out. If you select a method that does not time out as the second method, the third method will not be tried. Note that this parameter will not appear when you first create a new login list. 4. Use the drop-down menu to select the method, if any, that should appear third in the selected authentication login list. 5. Click ADD to add a new login list to the switch. 6. Click DELETE to remove the selected authentication login list from the configuration. The delete will fail if the selected login list is assigned to any user (including the default user) for system login. You can only use this button if you have Read/Write access. The change will not be retained across a power cycle unless you perform a save. Enable Authentication List Use this page to configure the enable access methods for Privileged EXEC-level management access to the CLI by using a console connection or a telnet or SSH session. In Privileged EXEC mode, read-write users have access to all CLI commands.The pre-configured users, admin and guest, are assigned to a pre-configured list named defaultList, which you may not delete. All newly created users are also assigned to the defaultList until you specifically assign them to a different list. To display the Enable Authentication List page, click Security Management Security > Authentication List Enable Authentication List. Managing Device Security 367