GS700TPS Smart Switch Software Administration Manual
To configure the Authentication List method:
1.
Click Security > Management Security > Authentication List. The Authentication List
screen displays:
Figure 6-5
The Authentication List screen contains the following fields:
•
1,2,3 – Select the order in which authentication is applied. The possible field values are:
–
TACACS+ – Authenticates the user at the TACACS+ server. For more information,
see "TACACS+".
–
RADIUS – Authenticates the user at the RADIUS server. For more information, see
"RADIUS".
–
Local – Authenticates the user at the device level. The device checks the user name
and password for authentication
–
None – Assigns no authentication method to the authentication list.
2. Select the Authentication List entry.
3. Select the order of authentication (1,2,3) for each method from the list in the provided field in
the first row.
4. Click APPLY to update the device.
Port Authentication
The Port Authentication menu contains the following options:
•
"Basic"
•
"Advanced"
Managing Security
v1.0, June 2009
6-8