Restricting User Login Sessions
4. (Optional) show system login [failures]
5. (Optional) copy running-config startup-config
DETAILED STEPS
Command or Action
Step 1
configure terminal
Example:
switch# configure terminal
Step 2
[no] system login block-for seconds attempts tries within
seconds
Example:
switch(config)#
attempts 2 within 60
Step 3
(Optional) [no] system login quiet-mode access-class
acl-name
Example:
switch(config)#
access-class myacl
Step 4
(Optional) show system login [failures]
Example:
switch(config)# show
Step 5
(Optional) copy running-config startup-config
Example:
switch(config)# copy running-config startup-config
Restricting User Login Sessions
You can restrict the maximum number of simultaneous login sessions per user. Doing so prevents users from
having multiple unwanted sessions and solves the potential security issue of unauthorized users accessing a
valid SSH or Telnet session.
SUMMARY STEPS
1. configure terminal
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
30
system
login block-for 100
system
login quiet-mode
system
login
Purpose
Enters global configuration mode.
Configures the quiet mode time period. The range for all
arguments is from 1 to 65535.
The example shows how to configure the switch to enter a
100-second quiet period if 2 failed login attempts are
exceeded within 60 seconds.
After you enter this command, all login attempts made
through Telnet or SSH are denied during the quiet period.
Access control lists (ACLs) are not exempt from the quiet
period until the system command is entered.
Note
You must enter this command before any other
login command can be used.
Specifies an ACL that is to be applied to the switch when
it changes to quiet mode. When the switch is in quiet mode,
all login requests are denied, and the only available
connection is through the console.
Displays the login parameters. The failures option displays
information related only to failed login attempts.
Copies the running configuration to the startup
configuration.
Configuring AAA