My background is not in security, but more so in hardware design...but I have come across a question I am asking for help on...I am cofiguring a device to put on our network. We have network logins and if the TACACS server is down, it auth's locally...