Authentication List Configuration
The Authentication List folder contains links to the following features:
•
Login Authentication List
•
Enable Authentication List
•
Dot1x Authentication List
•
HTTP Authentication List
•
HTTPS Authentication List
Login Authentication List
You use this page to configure login lists. A login list specifies the authentication method(s)
you want to be used to validate switch or port access for the users associated with the list.
The pre-configured users, admin and guest, are assigned to a pre-configured list named
defaultList, which you may not delete. All newly created users are also assigned to the
defaultList until you specifically assign them to a different list
To display the Login Authentication List page, click Security
Authentication List
Login Authentication List.
List Name - If you are creating a new login list, enter the name you want to assign. It
1.
can be up to 15 alphanumeric characters long and is not case sensitive.
Use the dropdown menu to select the method that should appear first in the selected
2.
authentication login list. If you select a method that does not time out as the first method,
such as 'local' no other method will be tried, even if you have specified more than one
method. The options are:
Local - The user's locally stored ID and password will be used for authentication.
•
Radius - The user's ID and password will be authenticated using the RADIUS server
•
instead of locally.
Line - The line password will be used for authentication.
•
Enable - The privileged EXEC password will be used for authentication.
•
Tacacs - The user's ID and password will be authenticated using the TACACS+
•
server.
None - The user will not be authenticated.
•
Web Management User Guide
on page 236
on page 237
on page 238
on page 238
on page 239
236
Management Security >