GS700TR Smart Switch Software Administration Manual
Managing Device Security 6-13
v1.0, May, 2008
2. If you make changes to the page, or add a new entry, click Apply to apply the changes to the
system.
3. To delete a configured TACACS+ server, select the IP address of the server from the
TACACS+
Server IP Address dropdown menu, and then click Delete.
Authentication List Configuration
Use the Authentication List page to configure login lists. A login list specifies one or more
authentication methods to validate switch or port access for the admin user.
To access the Authentication List page:
1. Click Security > Management Security, and then click the Authentication List link.
Key String Defines the authentication and encryption key for TACACS+
communications between the device and the TACACS+ server. This key
must match the encryption used on the TACACS+ server. The valid
range is 0-128 characters.
Connection Timeout The amount of time that passes before the connection between the
device and the TACACS+ server times out. The field range is from 1 to
30 seconds.
Note: Admin is the only user on the system and is assigned to a pre-configured list
named defaultList, which you cannot delete. You can add admin to other lists or
configure the defaultList with other settings.
Figure 6-8
Table 6-9. TACACS+ Configuration Fields (continued)
Field Description