Port Numbers For Ssh And Telnet Connections In Nsm Overview; Limiting Login Attempts, Setting Dial-In Authentication, And Restricting Password Length In Nsm Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide

Port Numbers for SSH and Telnet Connections in NSM Overview

Related
Documentation
Limiting Login Attempts, Setting Dial-In Authentication, and Restricting Password
Length in NSM Overview
156
You can configure the port numbers to use for SSH and Telnet connections:
The default port for SSH client connections is 22; to change this default, enter a port
number between 1024 and 32,767.
The default port for Telnet client connections is 23; to change this default, enter a port
number between 1024 and 32,767.
In a vsys system, the root and vsys share the same SSH port number. For example, if you
change the SSH port from the default port 22, the port is also changed for all vsys.
NOTE: For ScreenOS 5.x devices, you can set or change the device port
numbers that accept Telnet and/or SSH connections the. "Set Admin Ports"
directive. To execute this directive, right-click the device in the Device Manager
device list and select Device > Set Admin Ports.
Limiting Login Attempts, Setting Dial-In Authentication, and Restricting Password
Length in NSM Overview on page 156
Asset Recovery and Reset Hardware in NSM Overview on page 157
File Formatting in NSM Overview on page 155
This topic describes the information about how to limit login attempts, set dial-in
authentication, and restrict password length and they are as follows:
Configuring Connection Attempts
To minimize unauthorized access, you can limit the number of unsuccessful login attempts
allowed before the security device terminates a Telnet session. This restriction also
protects against certain types of attacks, such as automated dictionary attacks.
By default, a security device allows up to three unsuccessful login attempts before it
closes the Telnet session.
Configuring Modem Dial-In Authentication Timeout
You can set dial-in authentication timeout. You can even set the timeout as never time
out for users who dialin.
Configuring Password Length Restriction
To prevent a root device administrator from using short passwords (which are easier to
decode and discover), you can set the minimum length requirement for the root device
administrator password to any number from 1 to 31.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents