NETGEAR M4350-24F4V 24-Port 10G SFP+ Managed AV Network Switch User Manual
Page 651
4. Enter admin as the user name, enter your local device password, and click the Login
button.
The first time that you log in, no password is required. However, you then must
specify a local device password to use each subsequent time that you log in.
The System Information page displays.
5. Select Security > Management Security > Authentication List > Login
Authentication List.
The Login Authentication List page displays.
6. Do one of the following:
•
Create a new list: In the List Name field, specify a name.
The name can be up to 15 alphanumeric characters long and is not case-sensitive.
•
Modify an existing list: Select the check box that is associated with the list.
7. From the menu in the 1 column, select the authentication method that must be used
first in the selected authentication login list.
If you select a method that does not time out as the first method, such as Local, no
other method is tried, even if you specified more than one method. User
authentication occurs in the order that you select the methods:
•
Local: The user’s locally stored name and password are used for authentication.
Because the Local method does not time out, if you select this option as the first
method, no other method is tried, even if you specified more than one method.
This is the default selection for method 1.
•
Enable: The privileged EXEC password is used for authentication.
•
Line: The line password is used for authentication.
•
None: The user is allowed access without authentication.
•
Radius: The user's name and password are authenticated using the RADIUS
server instead of the local server.
•
Tacacs: The user's name and password are authenticated using the TACACS
server instead of the local server.
8. From the menus in the 2, 3, 4, 5, and 6 columns, select the authentication methods,
if any, that must be used in the selected authentication login list.
If a previous method times out, the next method is used. For example, the
authentication method that you select in the 2 column is tried after the authentication
method that select in the 1 column in the previous step. Similarly, the authentication
method that you select in the 3 column is tried after the authentication method that
you select in the 2 column, and so on. If you select a method that does not time out,
the next method is not tried.
Main User Manual
651
Manage Switch Security
Fully Managed Switches M4350 Series Main User Manual