Security Commands
Page 268 7450 ESS System Mangement Guide
With the introduction of the PKI on an SR (SSH Server) the authentication process can be done via
PKI or password. SSH client usually authenticate via PKI and password if PKI is configured on the
client. In this case PKI takes precedence over password in most clients.
All client authentications are logged and display in the show>system>security>user detail. Table 24
shows the rules where pass and fail attempts are logged.
TABLE
*A:Dut-C# show system security user detail
===============================================================================
Users
===============================================================================
User ID New User Permissions Password Login Failed Local
Pwd console ftp li snmp Expires Attempts Logins Conf
-------------------------------------------------------------------------------
admin n y n n n never 4 0 y
-------------------------------------------------------------------------------
Number of users : 1
Table 24: Pass/Fail Login Attempts
Authentica-
tion Order
Client
(i.e., putty)
Server
(i.e., SR)
CLI
Show System Security
Attempts (SR)
Private Key
Programmed
Public Key
Configured
Password
Configured
Logins
Attempts
Failed
Logins
1. Public Key Yes Yes N/A Increment
2. Password Yes Yes (No match
between client
and server. Go to
password.)
Yes Increment
Yes No Yes Increment
No N/A Yes Increment
No N/A No Increment
1. Public Key
(only)
Yes Yes N/A Increment
Yes Yes (No match
between client
and server. Go
go password.)
Increment
Yes N/A Increment
No N/A Increment