EasyManuals Logo

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X User Manual

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X
640 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #471 background imageLoading...
Page #471 background image
successfully authenticated. The timeout limits are independent of any limits configured
for virtual terminals (vtys). The following limits are supported:
■ User authentication protocol—SSH user authentication protocol enabled on the
router.
■ SSH timeout—Maximum time allowed for a user to be authenticated, starting
from the receipt of the first SSH protocol packet.
■ Authentication retry—Number of times a user can try to correct incorrect
information—such as a bad password—in a given connection attempt.
■ Sleep—Prevents a user that has exceeded the authentication retry limit from
connecting from the same host within the specified period.
ip ssh user-authentication-protocol
â–  Configures the SSH user authentication protocol. E-Series routers support RADIUS
and TACACS+ user authentication protocols.
â–  Specify an RADIUS or TACACS+.
â–  Example
host1(config)#ip ssh user-authentication-protocol TACACS+
â–  Use the no to restore the SSH user authentication protocol to the default, RADIUS.
â–  See ip ssh authentication-retries.
ip ssh authentication-retries
â–  Use to set the number of times that a user can retry a failed authentication, such
as trying to correct a wrong password. The SSH server terminates the connection
when the limit is exceeded.
■ Specify an integer in the range 0–20.
â–  Example
host1(config)#ip ssh authentication-retries 3
â–  Use the no version to restore the default value, 20 retry attempts.
â–  See ip ssh authentication-retries.
ip ssh disable-user-authentication
â–  Use to disable SSH password authentication. If you disable SSH authentication,
the authentication protocol becomes None and all SSH clients that pass protocol
negotiation are accepted.
â–  RADIUS authentication is enabled by default.
â–  Example
host1(config)#ip ssh disable-user-authentication
â–  Use the no version to restore default user authentication protocol, RADIUS.
â–  See ip ssh disable-user-authentication.
Secure System Administration with SSH â–  441
Chapter 7: Passwords and Security

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X and is the answer not in the manual?

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X Specifications

General IconGeneral
BrandJuniper
ModelSYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X
CategorySoftware
LanguageEnglish

Related product manuals