Dell Z9500 Command Reference Manual page 124

Hide thumbs Also See for Z9500:
Table of Contents

Advertisement

Version
9.8(0.0)
Usage
Only the system and security administrators can configure login activity tracking
Information
and view the login activity details of other users.
If you enable user login statistics, the system displays the last successful login
details of the current user and the details of any failed login attempts by others.
If you use the login statistics time-period days command to set a
custom time period, the system only reports the login statistics during that interval.
Example
When you log into the system, it displays a message similar to the following:
$ telnet 10.11.178.14
Trying 10.11.178.14...
Connected to 10.11.178.14.
Escape character is '^]'.
Login: admin
Password:
Last successful login: Mon Feb 16 04:36:11 2015 Line vty0
( 10.14.1.97 ).
There were 2 unsuccessful login attempt(s) since the last
successful login.
There were 3 unsuccessful login attempt(s) for user admin in
last 30 day(s).
The preceding message shows that the user had previously logged in to the system
using the VTY line from 10.14.1.97. It also displays the number of unsuccessful login
attempts since the last login and the number of unsuccessful login attempts in the
last 30 days.
$ telnet 10.11.178.14
Trying 10.11.178.14...
Connected to 10.11.178.14.
Escape character is '^]'.
Login: admin
Password:
Last successful login: Wed Feb 5 14:05:28 IST 2015 on console
There were 2 unsuccessful login attempt(s) since the last
successful login.
There were 3 unsuccessful login attempt(s) for user admin in
last 12 day(s).
The preceding message shows that the user had previously logged in to the system
using the console line. It also displays the number of unsuccessful login attempts
since the last login and the number of unsuccessful login attempts during a custom
time period.
124
Description
Introduced on the S4810, S4820, S5000, S6000, S6000-
ON, and Z9500.
NOTE: Login statistics is not applicable for login sessions that do not use user
names for authentication. For example, the system does not report login
activity for a telnet session that prompts only a password field.
Control and Monitoring

Advertisement

Table of Contents
loading

Table of Contents