For feedback, use the following:
ipd_online_feedback@alcatel-lucent.com
Table of Contents Previous Next Index PDF


Configuring Security with CLI
This section provides information to configure security using the command line interface.
Topics in this section include:
Setting Up Security Attributes
 
Configuring Authentication
 
Refer to the following sections to configure authentication:
By default, authentication is enabled locally. Perform the following tasks to configure security on each participating router:
 
To implement only RADIUS authentication, with authorization, perform the following tasks on each participating router:
 
To implement only TACACS+ authentication, perform the following tasks on each participating router:
 
Configuring Authorization
Refer to the following sections to configure authorization.
For local authorization, configure these tasks on each participating router:
 
For RADIUS authorization (without authentication), configure these tasks on each participating router:
For RADIUS authorization, VSAs must be configured on the RADIUS server. See Vendor-Specific Attributes (VSAs).
 
For RADIUS authorization (with authentication), configure these tasks on each participating router:
For RADIUS authorization, VSAs must be configured on the RADIUS server. See Vendor-Specific Attributes (VSAs).
 
For TACACS+ authorization (without authentication), configure these tasks on each participating router:
 
For TACACS+ authorization (with authentication), configure these tasks on each participating router:
 
Configuring Accounting
Refer to the following sections to configure accounting.
 
Security Configurations
This section provides information to configure security and configuration examples of configuration tasks.
To implement security features, configure the following components:
The following example displays default values for security parameters.
A:ALA-1>config>system>security# info detail
----------------------------------------------
	no hash-control
	telnet-server
	no telnet6-server
	no ftp-server
management-access-filter
		ip-filter
			no shutdown
		exit
		mac-filter
			no shutdown
		exit
	exit
	profile "default"
default-action none
no li
entry 10
no description
match “exec”
action permit
...
password
authentication-order radius tacplus local
no aging
minimum-length 6
attempts 3 time 5 lockout 10
complexity
exit
user "admin"
password "./3kQWERTYn0Q6w" hash
access console
no home-directory
no restricted-to-home
console
no login-exec
no cannot-change-password
no new-password-at-login
member "administrative"
exit
exit
snmp
view iso subtree 1
mask ff type included
exit
...
access group snmp-ro security-model snmpv1 security-level no-auth-no-privacy
read no-security notify no-security
		access group snmp-ro security-model snmpv2c security-level no-auth-no-privacy
read no-security notify no-security
		access group snmp-rw security-model snmpv1 security-level no-auth-no-privacy read
no-security write no-security notify no-security
		access group snmp-rw security-model snmpv2c security-level no-auth-no-privacy
read no-security write no-security notify no-security
		access group snmp-rwa security-model snmpv1 security-level no-auth-no-privacy
read iso write iso notify iso
		access group snmp-rwa security-model snmpv2c security-level no auth-no-privacy
read iso write iso notify iso
		access group snmp-trap security-model snmpv1 security-level no-auth-no-privacy
notify iso
		access group snmp-trap security-model snmpv2c security-level no-auth-no-privacy
notify iso
		access group cli-readonly security-model snmpv2c security-level
no-auth-no-privacy read iso notify iso
		access group cli-readwrite security-model snmpv2c security-level
no-auth-no-privacy read iso write iso notify iso
		attempts 20 time 5 lockout 10
	exit
	no ssh
Configuration Tasks
This section provides a brief overview of the tasks that must be performed to configure security and provides the CLI commands. Table 6 depicts the capabilities of authentication, authorization, and accounting configurations. For example, authentication can be enabled locally and on RADIUS and TACACS+ servers. Authorization can be executed locally, on a RADIUS server, or on a TACACS+ server. Accounting can be performed on a RADIUS or TACACS+ server.
 
Security Configuration Procedures
 
Configuring Management Access Filters
Creating and implementing management access filters is optional. Management access filters are software-based filters that control all traffic going in to the CPM, including all routing protocols. They apply to packets from all ports. The filters can be used to restrict management of the router by other nodes outside either specific (sub)networks or through designated ports. By default, there are no filters associated with security options. The management access filter and entries must be explicitly created on each router. These filters also apply to the management Ethernet port.
The OS implementation exits the filter when the first match is found and execute the actions according to the specified action. For this reason, entries must be sequenced correctly from most to least explicit. When both mac-filter and ip-filter/ipv6-filter are to be applied to a given traffic, mac-filter is applied first.
An entry may not have any match criteria defined (in which case, everything matches) but must have at least an action keyword specified to be considered active . Entries without the action keyword are considered incomplete and will be rendered inactive. Management Access Filter must have at least one active entry defined for the filter to be active.
The following is an example of a management access filter configuration that accepts packets matching the criteria specified in IP, IPv6 and MAC entries. Non-matching packets are denied for IPv4 filter and permitted for IPv6 and MAC filters.
*A:Dut-C>config>system>security>mgmt-access-filter# info 
----------------------------------------------
                ip-filter
                    default-action deny
                    entry 10
                        description "Accept SSH from mgmnt subnet"
                        src-ip 192.168.5.0/26
                        protocol tcp
                        dst-port 22 65535
                        action permit
                    exit
                exit
                ipv6-filter
                    default-action permit
                    entry 10
                        src-ip 3FFE::1:1/128
                        next-header rsvp
                        log
                        action deny
                    exit
                exit
                mac-filter
                    default-action permit
                    entry 12
                        match frame-type ethernet_II
                            svc-id 1
                            src-mac 00:01:01:01:01:01 ff:ff:ff:ff:ff:ff
                        exit
                        action permit
                    exit
                exit
----------------------------------------------
*A:Dut-C>config>system>security>mgmt-access-filter# 
 
Configuring CPM Filters Policy
The following displays an CPM filter configuration example:
*A:Dut-C>config>sys>security>cpm-filter# info 
ip-filter
                    shutdown
                    entry 100 create
                        action queue 50
                        log 110
                        match protocol icmp
                            fragment true
                            icmp-type dest-unreachable
                            icmp-code host-unreachable
                            multiple-option false
                            option-present true
                            src-ip 192.100.2.0/24
                        exit
                    exit
                exit
                ipv6-filter
                    shutdown
                    entry 30 create
                        action drop
                        log 190
                        match next-header tcp
                            dscp ef
                            dst-ip 3FFE::2:2/128
                            src-port 100 100
                            tcp-syn true
                            tcp-ack false
                            flow-label 10
                        exit
                    exit
                exit
                mac-filter
                    shutdown
                    entry 40 create
                        action accept
                        log 101
                        match frame-type ethernet_II
                            svc-id 12
                            dst-mac 00:03:03:03:01:01 ff:ff:ff:ff:ff:ff
                            etype 0x8902
                            cfm-opcode gt 100
                        exit
                    exit
                exit
*A:Dut-C>config>sys>security>cpm-filter# 
 
The following displays a MAC CPM filter configuration example:
*A:ALA-49>config>sys>sec>cpm>mac-filter# info
----------------------------------------------
                    entry 10 create
                        description "MAC-CPM-Filter 10.10.10.100 #007"
                        match
                        exit
                        log 101
                        action drop
                    exit
                    entry 20 create
                        description "MAC-CPM-Filter 10.10.10.100 #008"
                        match
                        exit
                        log 101
                        action drop
                    exit
                    no shutdown
----------------------------------------------
*A:ALA-49>config>sys>sec>cpm>mac-filter#
Configuring IPv6 CPM Filters
The following example displays an IPv6 CPM filter configuration:
A:ALA-48>config>sys>sec>cpm>ipv6-filter# info
                    entry 10 create
                        description "IPv6 CPM Filter"
                        log 101
                        match next-header igp
                            dst-ip 1000:1:1:1:1:1:1:1/112
                            src-ip 2000:1::1/96
                            flow-label 5000
                        exit
                    exit
                    entry 20 create
                        description "CPM-Filter 10.4.101.2 #201"
                        log 101
                        match next-header tcp
                            dscp af11
                            dst-ip 3FEE:12E1:2AC1:EA32::/64
                            src-ip 3FEE:1FE1:2AC1:EA32::/64
                            flow-label 5050
                        exit
                    exit
                    no shutdown
A:ALA-48>config>sys>sec>cpm>ipv6-filter# 
 
Configuring CPM Queues
CPM queues can be used to provide rate limit capabilities for traffic destined to CPM as described in an earlier section of this document.
The following example displays a CPM queue configuration:
A:ALA-987>config>sys>security>cpm-queue# info
----------------------------------------------
                queue 33 create
                exit
                queue 101 create
                    cbs 5
                    mbs 5
                    rate 5 cir 5
                exit
                queue 102 create
                    cbs 5
                    mbs 5
                    rate 5 cir 5
                exit
                queue 103 create
                    cbs 5
                    mbs 5
                    rate 5 cir 5
                exit
                queue 104 create
                    cbs 5
                    mbs 5
                    rate 5 cir 5
----------------------------------------------
A:ALA-987>config>sys>security>cpm-queue#
Configuring Password Management Parameters
Password management parameters consists of defining aging, the authentication order and authentication methods, password length and complexity, as well as the number of attempts a user can enter a password.
Depending on the your authentication requirements, password parameters are configured locally.
Use the following CLI commands to configure password support:
CLI Syntax: config>system>security
password
admin-password password [hash|hash2]
aging days
attempts count [time minutes1] [lockout minutes2]
authentication-order [method-1] [method-2] [method-3] [exit-on-reject]
complexity [numeric] [special-character] [mixed-case]
health-check
minimum-length value
The following example displays a password configuration:
A:ALA-1>config>system>security# info
----------------------------------------------
	password
	authentication-order radius tacplus local
		aging 365
		minimum-length 8
		attempts 5 time 5 lockout 20
	exit
----------------------------------------------
A:ALA-1>config>system>security#
 
IPSec Certificates Parameters
The following is an example to importing a certificate from a pem format:
*A:SR-7/Dut-A# admin certificate import type cert input cf3:/pre-import/R1-0cert.pem output R1-0cert.der format pem
 
The following is an example for exporting a certificate to pem format:
*A:SR-7/Dut-A#  admin certificate export type cert input R1-0cert.der output cf3:/R1-0cert.pem format pem
 
The following displays an example of profile output:
*A:SR-7/Dut-A>config>system>security>pki# info
----------------------------------------------
                ca-profile "Root" create
                    description "Root CA"
                    cert-file "R1-0cert.der"
                    crl-file "R1-0crl.der"
                    no shutdown
                exit
----------------------------------------------
*A:SR-7/Dut-A>config>system>security>pki#
 
The following displays an example of an ike-policy with cert-auth output:
:SR-7/Dut-A>config>ipsec>ike-policy# info
----------------------------------------------
            ike-version 2
            auth-method cert-auth
            own-auth-method psk      
----------------------------------------------
 
The following displays an example ofa static lan-to-lan configuration using cert-auth:
interface "VPRN1" tunnel create
                sap tunnel-1.private:1 create
                    ipsec-tunnel "Sanity-1" create
                        security-policy 1
                        local-gateway-address 30.1.1.13 peer 50.1.1.15 delivery-service 300
                        dynamic-keying
                            ike-policy 1
                            pre-shared-key "Sanity-1"
                            transform 1
                            cert
                                trust-anchor "R1-0"
                                cert "M2cert.der"
                                key "M2key.der"
                            exit
                        exit
                        no shutdown
                    exit
                exit
            exit
 
Configuring Profiles
Profiles are used to deny or permit access to a hierarchical branch or specific commands. Profiles are referenced in a user configuration. A maximum of sixteen user profiles can be defined. A user can participate in up to sixteen profiles. Depending on the the authorization requirements, passwords are configured locally or on the RADIUS server.
Use the following CLI commands to configure user profiles:
CLI Syntax: config>system>security
profile user-profile-name
default-action {deny-all|permit-all|none}
renum old-entry-number new-entry-number
entry entry-id
description description-string
match command-string
action {permit|deny}
 
The following example displays a user profile output:
A:ALA-1>config>system>security# info
----------------------------------------------
...
            profile "ghost"
                default-action permit-all
                entry 1
                    match "configure"
                    action permit
                exit
                entry 2
                    match "show"
                exit
                entry 3
                    match "exit"
                exit
            exit
...
----------------------------------------------
A:ALA-1>config>system>security#
Configuring Users
Configure access parameters for individual users. For user, define the login name for the user and, optionally, information that identifies the user. Use the following CLI commands to configure RADIUS support:
CLI Syntax: config>system>security
user user-name
access [ftp] [snmp] [console] [li]
console
cannot-change-password
login-exec url-prefix:source-url
member user-profile-name [user-profile-name...(up to 8 max)]
new-password-at-login
home-directory url-prefix [directory][directory/directory ..]
password [password] [hash|hash2]
restricted-to-home
snmp
authentication {[none]|[[hash] {md5 key-1|sha key-1} privacy {none|des-key|aes-128-cfb-key key-2]}
group group-name
user-template template-name
 
The following displays a user configuration example:
A:ALA-1>config>system>security# info
----------------------------------------------
...
            user "49ers"
                password "qQbnuzLd7H/VxGdUqdh7bE" hash2
                access console ftp snmp
                restricted-to-home
                console
                    member "default"
                    member "ghost"
                exit
            exit
...
--------------------------------------------
A:ALA-1>config>system>security#
 
Configuring Keychains
The following displays a keychain configuration.
A:ALA-1>config>system>security# info
----------------------------------------------
...
            keychain "abc"
                direction
                    bi
                        entry 1 key "ZcvSElJzJx/wBZ9biCtOVQJ9YZQvVU.S" hash2 alg
orithm aes-128-cmac-96
                            begin-time 2006/12/18 22:55:20
                        exit
                    exit
                exit
            exit
            keychain "basasd"
                direction
                    uni
                        receive
                            entry 1 key "Ee7xdKlYO2DOm7v3IJv/84LIu96R2fZh" hash2
 algorithm aes-128-cmac-96
                                tolerance forever
                            exit
                        exit
                    exit
                exit
            exit
...
----------------------------------------------
A:ALA-1>config>system>security#
Copying and Overwriting Users and Profiles
You can copy a profile or user. You can copy a profile or user or overwrite an existing profile or user. The overwrite option must be specified or an error occurs if the destination profile or username already exists.
 
User
CLI Syntax: config>system>security# copy {user source-user | profile source-profile} to destination [overwrite]
 
Example: config>system>security# copy user testuser to testuserA
MINOR: CLI User "testuserA" already exists - use overwrite flag.
config>system>security#
config>system>security# copy user testuser to testuserA overwrite
config>system>security#
 
The following output displays the copied user configurations:
A:ALA-12>config>system>security# info
----------------------------------------------
...
            user "testuser"
                password "F6XjryaATzM" hash
                access snmp
                snmp
                    authentication hash md5 e14672e71d3e96e7a1e19472527ee969 privacy none
                    group "testgroup"
                exit
            exit
            user "testuserA"
                password "" hash2
                access snmp
                console
                    new-password-at-login
                exit
                snmp
                    authentication hash md5 e14672e71d3e96e7a1e19472527ee969 privacy none
                    group "testgroup"
                exit
            exit
...
----------------------------------------------
A:ALA-12>config>system>security# info
Note that the cannot-change-password flag is not replicated when a copy user command is performed. A new-password-at-login flag is created instead.
A:ALA-12>config>system>security>user# info
----------------------------------------------
	password "F6XjryaATzM" hash
	access snmp
	console
		cannot-change-password 
	exit
	snmp
		authentication hash md5 e14672e71d3e96e7a1e19472527ee969 privacy none
		group "testgroup"
	exit
----------------------------------------------
A:ALA-12>config>system>security>user# exit
A:ALA-12>config>system>security# user testuserA
A:ALA-12>config>system>security>user# info
----------------------------------------------
	password "" hash2
	access snmp
	console
		new-password-at-login
	exit
	snmp
		authentication hash md5 e14672e71d3e96e7a1e19472527ee969 privacy none
		group "testgroup"
	exit
----------------------------------------------
A:ALA-12>config>system>security>user#
 
 
Profile
CLI Syntax: config>system>security# copy {user source-user | profile source-profile} to destination [overwrite]
Example: config>system>security# copy profile default to testuser
The following output displays the copied profiles:
A:ALA-49>config>system>security# info
----------------------------------------------
...
A:ALA-49>config>system>security# info detail
----------------------------------------------
...
            profile "default"
                default-action none
                entry 10
                    no description
                    match "exec"
                    action permit
                exit
                entry 20
                    no description
                    match "exit"
                    action permit
                exit
                entry 30
                    no description
                    match "help"
                    action permit
                exit
                entry 40
                    no description
                    match "logout"
                    action permit
                exit
                entry 50
                    no description
                    match "password"
                    action permit
                exit
                entry 60
                    no description
                    match "show config"
                    action deny
                exit
                entry 70
                    no description
                    match "show"
                    action permit
                exit
                entry 80
                    no description
                    match "enable-admin"
                    action permit
                exit
            exit
            profile "testuser"
                default-action none
                entry 10
                    no description
                    match "exec"
                    action permit
                exit
                entry 20
                    no description
                    match "exit"
                    action permit
                exit
                entry 30
                    no description
                    match "help"
                    action permit
                exit
                entry 40
                    no description
                    match "logout"
                    action permit
                exit
                entry 50
                    no description
                    match "password"
                    action permit
                exit
                entry 60
                    no description
                    match "show config"
                    action deny
                exit
                entry 70
                    no description
                    match "show"
                    action permit
                exit
                entry 80
                    no description
                    match "enable-admin"
                    action permit
                exit
            exit
            profile "administrative"
                default-action permit-all exit
...
----------------------------------------------
A:ALA-12>config>system>security#
 
 
RADIUS Configurations
 
Configuring RADIUS Authentication
RADIUS is disabled by default and must be explicitly enabled. The mandatory commands to enable RADIUS on the local router are radius and server server-index address ip-address secret key.
Also, the system IP address must be configured in order for the RADIUS client to work. See Configuring a System Interface of the 7750 SR OS Router Configuration Guide.
The other commands are optional. The server command adds a RADIUS server and configures the RADIUS server’s IP address, index, and key values. The index determines the sequence in which the servers are queried for authentication requests.
On the local router, use the following CLI commands to configure RADIUS authentication:
CLI Syntax: config>system>security
radius
port port
retry count
server server-index address ip-address secret key
timeout seconds
no shutdown
The following displays a RADIUS authentication configuration example:
A:ALA-1>config>system>security# info
----------------------------------------------
                retry 5
                timeout 5
                server 1 address 10.10.10.103 secret "test1"
                server 2 address 10.10.0.1 secret "test2"
                server 3 address 10.10.0.2 secret "test3"
                server 4 address 10.10.0.3 secret "test4"
...
----------------------------------------
A:ALA-1>config>system>security#
Configuring RADIUS Authorization
In order for RADIUS authorization to function, RADIUS authentication must be enabled first. See Configuring RADIUS Authentication.
In addition to the local configuration requirements, VSAs must be configured on the RADIUS server. See Vendor-Specific Attributes (VSAs).
On the local router, use the following CLI commands to configure RADIUS authorization:
CLI Syntax: config>system>security
radius
authorization
 
The following displays a RADIUS authorization configuration example:
A:ALA-1>config>system>security# info
----------------------------------------------
...
            radius
                authorization
                retry 5
                timeout 5
                server 1 address 10.10.10.103 secret "test1"
                server 2 address 10.10.0.1 secret "test2"
                server 3 address 10.10.0.2 secret "test3"
                server 4 address 10.10.0.3 secret "test4"
            exit
...
----------------------------------------------
A:ALA-1>config>system>security#
Configuring RADIUS Accounting
On the local router, use the following CLI commands to configure RADIUS accounting:
CLI Syntax: config>system>security
radius
accounting
 
The following displays RADIUS accounting configuration example:
A:ALA-1>config>system>security# info
----------------------------------------------
...
           radius
               shutdown
               authorization
               accounting
               retry 5
               timeout 5
               server 1 address 10.10.10.103 secret "test1"
               server 2 address 10.10.0.1 secret "test2"
               server 3 address 10.10.0.2 secret "test3"
               server 4 address 10.10.0.3 secret "test4"
           exit
...
----------------------------------------------
A:ALA-1>config>system>security#
Configuring 802.1x RADIUS Policies
Use the following CLI commands to configure generic authentication parameters for clients using 802.1x EAPOL. Additional parameters are configured per Ethernet port. Refer to the 7750 SR OS Interface Configuration Guide
To configure generic parameters for 802.1x authentication, enter the following CLI syntax.
CLI Syntax: config>system>security
dot1x
radius-plcy policy-name
server server-index address ip-address secret key [port port]
source-address ip-address
no shutdown
 
The following displays a 802.1x configuration example:
 
A:ALA-1>config>system>security# info
----------------------------------------------
            dot1x
                radius-plcy "dot1x_plcy" create
                   server 1 address 1.1.1.1 port 65535 secret "a"
                   server 2 address 1.1.1.2 port 6555 secret "a"
                   source-address 1.1.1.255
                no shutdown
...
----------------------------------------------
A:ALA-1>config>system#
Configuring CPU Protection Policies
The CPU protection features are supported on the 7750 SR-7/12 platforms. These features are not available on the 7750 SR-1 or 7750 SR-c12.
The following output displays a configuration of the CPU protection parameters and a CPU protection policy:
Node_3>config>sys>security>cpu-protection# info
----------------------------------------------
                link-specific-rate 4000
                policy 4 create
                    no alarm
                    description "My new CPU Protection policy"
                    overall-rate 9000
                    per-source-rate 2000
                    out-profile-rate 4000
                exit
                policy 254 create
                exit
                policy 255 create
                exit
                port-overall-rate 12000
                protocol-protection
----------------------------------------------
Node_3>config>sys>security>cpu-protection#
 
The following output displays an application to an interface:
Node_3>config>service>ies>if# info
----------------------------------------------
                cpu-protection 4
                sap 1/1/5 create
                exit
----------------------------------------------
Node_3>config>sys>security>cpu-protection#
TACACS+ Configurations
 
Enabling TACACS+ Authentication
To use TACACS+ authentication on the router, configure one or more TACACS+ servers on the network.
Use the following CLI commands to configure profiles:
CLI Syntax: config>system>security
tacplus
server server-index address ip-address secret key
timeout seconds
no shutdown
 
The following displays a TACACS+ authentication configuration example:
A:ALA-1>config>system>security>tacplus# info
----------------------------------------------
                timeout 5
                server 1 address 10.10.0.5 secret "test1"
                server 2 address 10.10.0.6 secret "test2"
                server 3 address 10.10.0.7 secret "test3"
                server 4 address 10.10.0.8 secret "test4"
                server 5 address 10.10.0.9 secret "test5"
----------------------------------------------
A:ALA-1>config>system>security>tacplus#
Configuring TACACS+ Authorization
In order for TACACS+ authorization to function, TACACS+ authentication must be enabled first. See Enabling TACACS+ Authentication.
On the local router, use the following CLI commands to configure RADIUS authorization:
CLI Syntax: config>system>security
tacplus
authorization
no shutdown
 
The following displays a TACACS+ authorization configuration example:
A:ALA-1>config>system>security>tacplus# info
----------------------------------------------
                authorization
                timeout 5
                server 1 address 10.10.0.5 secret "test1"
                server 2 address 10.10.0.6 secret "test2"
                server 3 address 10.10.0.7 secret "test3"
                server 4 address 10.10.0.8 secret "test4"
                server 5 address 10.10.0.9 secret "test5"
----------------------------------------------
A:ALA-1>config>system>security>tacplus# 
Configuring TACACS+ Accounting
On the local router, use the following CLI commands to configure TACACS+ accounting:
CLI Syntax: config>system>security
tacplus
accounting
 
The following displays a TACACS+ accounting configuration example:
A:ALA-1>config>system>security>tacplus# info
----------------------------------------------
                accounting
                authorization
                timeout 5
                server 1 address 10.10.0.5 secret "test1"
                server 2 address 10.10.0.6 secret "test2"
                server 3 address 10.10.0.7 secret "test3"
                server 4 address 10.10.0.8 secret "test4"
                server 5 address 10.10.0.9 secret "test5"
----------------------------------------------
A:ALA-1>config>system>security>tacplus#
Enabling SSH
Use the SSH command to configure the SSH server as SSH1, SSH2 or both. The default is SSH2 (SSH version 2). This command should only be enabled or disabled when the SSH server is disabled. This setting should not be changed while the SSH server is running since the actual change only takes place after SSH is disabled or enabled.
CLI Syntax: config>system>security
ssh
preserve-key
no server-shutdown
version ssh-version
 
The following displays a SSH server configuration as both SSH and SSH2 using a host-key:
A:sim1>config>system>security>ssh# info
----------------------------------------------
                preserve-key
                version 1-2
----------------------------------------------
A:sim1>config>system>security>ssh# 
 
Configuring Login Controls
Configure login control parameters for console, Telnet, and FTP sessions.
To configure login controls, enter the following CLI syntax.
CLI Syntax: config>system
login-control
exponential-backoff
ftp
inbound-max-sessions value
telnet
inbound-max-sessions value
outbound-max-sessions value
idle-timeout {minutes |disable}
pre-login-message login-text-string [name]
login-banner
motd {url url-prefix: source-url|text motd-text-string}
 
The following displays a login control configuration example:
A:ALA-1>config>system# info
----------------------------------------------
...
       login-control
           ftp
               inbound-max-sessions 5
           exit
           telnet
               inbound-max-sessions 7
               outbound-max-sessions 2
           exit
           idle-timeout 1440
           pre-login-message "Property of Service Routing Inc. Unauthorized access prohibited."
           motd text "Notice to all users: Software upgrade scheduled 3/2 1:00 AM"
       exit
	 no exponential-backoff
...
----------------------------------------------
A:ALA-1>config>system#