Managing Device Security
367
ProSafe M5300 Switch
To configure the authentication lists for access to the switch management interface:
1. List Name - If you are creating a new login list, enter the name you want to assign. It
can be up to 15 alphanumeric characters long and is not case sensitive.
2. Use the drop-down menu to select the method that should appear first in the selected
authentication login list. If you select a method that does not time out as the first method,
such as local no other method will be tried, even if you have specified more than one
method. The options are:
• Local — The user's locally stored ID and password will be used for authentication.
• Radius — The user's ID and password will be authenticated using the RADIUS server
instead of locally.
• Line — The line password will be used for authentication.
• Enable — The privileged EXEC password will be used for authentication.
• Tacacs — The user's ID and password will be authenticated using the TACACS+
server.
• None —The user will not be authenticated.
3. Use the drop down menu to select the method, if any, that should appear second in the
selected authentication login list. This is the method that will be used if the first method times
out. If you select a method that does not time out as the second method, the third method
will not be tried. Note that this parameter will not appear when you first create a new login
list.
4. Use the drop-down menu to select the method, if any, that should appear third in the
selected authentication login list.
5. Click ADD to add a new login list to the switch.
6. Click DELETE to remove the selected authentication login list from the configuration. The
delete will fail if the selected login list is assigned to any user (including the default user) for
system login. You can only use this button if you have Read/Write access. The change will
not be retained across a power cycle unless you perform a save.
Enable Authentication List
Use this page to configure the enable access methods for Privileged EXEC-level
management access to the CLI by using a console connection or a telnet or SSH session. In
Privileged EXEC mode, read-write users have access to all CLI commands.The
pre-configured users, admin and guest, are assigned to a pre-configured list named
defaultList, which you may not delete. All newly created users are also assigned to the
defaultList until you specifically assign them to a different list.
To display the Enable Authentication List page, click Security Management Security >
Authentication List
Enable Authentication List.