Netgear XCM89UP Web Management User Guide - Page 406
Authentication List Configuration, Login Authentication List
View all Netgear XCM89UP manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 406 highlights
M6100 Web Management User Guide 4. Use Key String to specify the authentication and encryption key for TACACS communications between the device and the TACACS server. The valid range is 0-128 characters. The key must match the key used on the TACACS server. 5. Use Connection Timeout to specify the amount of time that passes before the connection between the device and the TACACS server time out. The range is between 1-30. 6. Click Add to add a new server to the switch. This button is only available to READWRITE users. These changes will not be retained across a power cycle unless a save is performed. 7. Click Delete to delete the selected server from the configuration. Authentication List Configuration The Authentication List link contains links to the following pages: • Login Authentication List on page 406 • Enable Authentication List on page 407 • Dot1x Authentication List on page 408 • HTTP Authentication List on page 409 • HTTPS Authentication List on page 410 Login Authentication List You use this page to configure login lists. A login list specifies the authentication method(s) you want to be used to validate switch or port access for the users associated with the list. The pre-configured users, admin and guest, are assigned to a pre-configured list named defaultList, which you cannot delete. All newly created users are also assigned to the defaultList until you specifically assign them to a different list. Two default lists are present: DefaultList and networkList. To display the Login Authentication List page, click Security > Management Security > Authentication List > Login Authentication List. 1. List Name - If you are creating a new login list, enter the name you want to assign. It can be up to 15 alphanumeric characters long and is not case sensitive. 2. Use the menu to select the method that should appear first in the selected authentication login list. If you select a method that does not time out as the first method, such as 'local', no other method will be tried, even if you have specified more than one method. The options are: • Enable- the privileged EXEC password will be used for authentication. • Line- the line password will be used for authentication. Managing Device Security 406