Security Audit Server Portassignment; Security Session Failedloginslockouttime; Security Session Inactivitytimeout; Security Session Maxfailedlogins - Cisco TelePresence SX10 Quick Set Administrator's Manual

Hide thumbs Also See for TelePresence SX10 Quick Set:
Table of Contents

Advertisement

Cisco TelePresence SX10 Quick Set
Introduction

Security Audit Server PortAssignment

The audit logs are sent to a syslog server. You can define how the port number of the
external syslog server will be assigned. This setting is only relevant when Security Audit
Logging Mode is set to External or ExternalSecure. To see which port number is used you
can check the Security Audit Server Port status. Navigate to Setup > Status on the web
interface or; if on a command line interface, run the command xStatus Security Audit Server
Port.
Requires user role: AUDIT
Default value: Auto
Value space: Auto/Manual
Auto: Will use UDP port number 514 when the Security Audit Logging Mode is set to
External. Will use TCP port number 6514 when the Security Audit Logging Mode is set to
ExternalSecure.
Manual: Will use the port value defined in the Security Audit Server Port setting.

Security Session FailedLoginsLockoutTime

Define how long the device will lock out a user after failed login to a web or SSH session.
Restart the device for any change to this setting to take effect.
Requires user role: ADMIN
Default value: 60
Value space: Integer (0..10000)
Set the lockout time (minutes).

Security Session InactivityTimeout

Define how long the device will accept inactivity from the user before he is automatically
logged out from a web, Telnet, or SSH session.
Restart the device for any change to this setting to take effect.
Requires user role: ADMIN
Default value: 0
Value space: Integer (0..10000)
Set the inactivity timeout (minutes); or select 0 when inactivity should not enforce
automatic logout.
D15330.16 SX10 Administrator Guide CE9.9, OCTOBER 2019.
Configuration
Peripherals
Maintenance

Security Session MaxFailedLogins

Define the maximum number of failed login attempts per user for a web or SSH session. If
the user exceeded the maximum number of attempts the user will be locked out. 0 means
that there is no limit for failed logins.
Restart the device for any change to this setting to take effect.
Requires user role: ADMIN
Default value: 0
Value space: Integer (0..10)
Set the maximum number of failed login attempts per user.

Security Session MaxSessionsPerUser

The maximum number of simultaneous sessions per user is 20 sessions.
Requires user role: ADMIN
Default value: 20
Value space: Integer (1..20)
Set the maximum number of simultaneous sessions per user.

Security Session MaxTotalSessions

The maximum number of simultaneous sessions in total is 20 sessions.
Requires user role: ADMIN
Default value: 20
Value space: Integer (1..20)
Set the maximum number of simultaneous sessions in total.
www.cisco.com — Copyright © 2019 Cisco Systems, Inc. All rights reserved.
150
Administrator Guide
Device settings
Device settings
Appendices

Advertisement

Table of Contents
loading

Table of Contents