User Manual
Table Of Contents
- M6100 Web Management User Guide
- Contents
- 1. Getting Started
- 2. Configuring System Information
- 3. Configuring Switching Information
- 4. Routing
- 5. Configuring Quality of Service
- 6. Managing Device Security
- 7. Monitoring the System
- 8. Maintenance
- 9. Help
- A. Default Settings
- B. Configuration Examples
- C. Notification of Compliance
Managing Device Security
407
M6100 Web Management User Guide
• Local- the user's locally stored ID and password will be used for authentication
• None- the user will not be authenticated.
• Radius- the user's ID and password will be authenticated using the RADIUS server
instead of local server
.
• T
acacs- the user's ID and password will be authenticated using the TACACS server.
3. Use the menu to select the method, if any
, that should appear second in the selected
authentication login list. This is the method that will be used if the first method times out. If
you select a method that does not time out as the second method, the third method will not
be tried. Note that this parameter will not appear when you first create a new login list.
4. Use the menu to select the method, if any
, that should appear third in the selected
authentication login list. If you select a method that does not time out as the third method,
the fourth method will not be tried.
5. Use the menu to select the method, if any
, that should appear fourth in the selected
authentication login list. If you select a method that does not time out as the fourth method,
the fifth method will not be tried.
6. Use the menu to select the method, if any
, that should appear fifth in the selected
authentication login list. If you select a method that does not time out as the fifth method, the
sixth method will not be tried.
7. Use the menu to select the method, if any
, that should appear sixth in the selected
authentication login list.
8. Click Add to add a new login list to the switch.
9. Click Delete to remove the selected authentication login list from the configuration.
The
delete will fail if the selected login list is assigned to any user (including the default user) for
system login. You can only use this button if you have Read/Write access. The change will
not be retained across a power cycle unless you perform a save.
Enable Authentication List
You use this page to configure enable lists. A enable list specifies the authentication
method(s) you use to validate privileged EXEC access for the users associated with the list.
The pre-configured users, admin and guest, are assigned to a pre-configured list named
defaultList, which you cannot delete. All newly created users are also assigned to the
defaultList until you specifically assign them to a different list
Two default lists are present: enableList and enableNetList.
To display the Enable Authentication List page, click Security
Management Security >
Authentication List
Enable Authentication List.










