User's Manual 874 Document #: LTRT-89730
Mediant 3000
Parameter Description
Max Binary Packet Size
[SSHMaxBinaryPacketSi
ze]
Defines the maximum packet size (in bytes) for SSH packets.
The valid value is 582 to 35000. The default is 35000.
Maximum SSH Sessions
[SSHMaxSessions]
Defines the maximum number of simultaneous SSH sessions.
The valid range is 1 to 5. The default is 2 sessions.
Enable Last Login
Message
[SSHEnableLastLoginMe
ssage]
Enables message display in SSH sessions of the time and date of the last
SSH login. The SSH login message displays the number of unsuccessful
login attempts since the last successful login.
ï‚§ [0] Disable
ï‚§ [1] Enable (default)
Note: The last SSH login information is cleared when the device is reset.
Max Login Attempts
[SSHMaxLoginAttempts
]
Defines the maximum SSH login attempts allowed for entering an
incorrect password by an administrator before the SSH session is
rejected.
The valid range is 1 to 3. the default is 3.
58.4.6 IDS Parameters
The Intrusion Detection System (IDS) parameters are described in the table below.
Table 58-29: IDS Parameters
Parameter Description
Intrusion Detection
System (IDS)
[EnableIDS]
Enables the IDS feature.
ï‚§ [0] Disable (default)
ï‚§ [1] Enable
Note: For the parameter to take effect, a device reset is required.
[IDSAlarmClearPeriod]
Defines the interval (in seconds) after which an IDS alarm is cleared from
the Active Alarms table if no thresholds are crossed during this time.
However, this "quiet" period must be at least twice the Threshold Window
value. For example, if IDSAlarmClearPeriod is set to 20 sec and the
Threshold Window is set to 15 sec, the IDSAlarmClearPeriod parameter
is ignored and the alarm is cleared only after 30 seconds (2 x 15 sec).
The valid value is 0 to 86400. The default is 300.
IDS Policy Table
IDS Policy Table
[IDSPolicy]
Defines IDS Policies.
The format of the ini file parameter is:
[ IDSPolicy ]
FORMAT IDSPolicy_Index = IDSPolicy_Name, IDSPolicy_Description;
[ \IDSPolicy ]
For a detailed description of the table, see ''Configuring IDS Policies'' on
page 179.
IDS Rule Table