Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Did you find out the best practice, or just any practice that does this? Some manufactures let us create the list of users, then point that use to local, ldap, tacacs+, radius, etc... for auth. But for the manufactures that don't (like Cisco hardwar...