System information
Chapter 7: Managing Device Security | 201
GS752TXS Smart Switch Software Administration Manual
4. In the Key String field, specify the authentication and encryption key for TACACS+
communications between the GS752TXS and the TACACS+ server. This key must match
the encryption used on the TACACS+ server. The valid range is 0–128 characters.
5. In the Connection Timeout field, specify the amount of time that passes before the
connection between the device and the TACACS+ server times out. The field range is from
1 to 30 seconds.
6. If you make changes to the page, or add a new entry, click Apply to apply the changes to
the system.
7. To delete a configured TACACS+ server, select the IP address of the server from the
TACACS+
Server drop-down menu, and then click Delete.
Authentication List Configuration
Use the Authentication List page to configure the default login list. A login list specifies one or
more authentication methods to validate switch or port access for the admin user.
Note: Admin is the only user on the system and is assigned to a
preconfigured list named defaultList, which you cannot delete.
To access the Authentication List page, click Security
Management Security, and then click
the Authentication List link.
To change the authentication method for the defaultList:
1. Select the check box next to the defaultList name
2. Use the drop-down menu in the 1 column to select the authentication method that should
appear first in the selected authentication login list. If you select a method that does not time
out as the first method, such as ‘local’, no other method will be tried, even if you have










