EMS: Telnet SSH Max Sessions
[SSHMaxSessions]
Defines the maximum number of simultaneous SSH sessions.
The valid range is 1 to 2. The default is 2 sessions.
Web: Enable Last Login Message
[SSHEnableLastLoginMessage]
Enables message display in SSH sessions of the time and date of
the last SSH login. The SSH login message displays the number
of unsuccessful login attempts since the last successful login.
ï‚§ [0] Disable
ï‚§ [1] Enable (default)
Note: The last SSH login information is cleared when the device
is reset.
Web: Max Login Attempts
[SSHMaxLoginAttempts]
Defines the maximum SSH login attempts allowed for entering an
incorrect password by an administrator before the SSH session is
rejected.
The valid range is 1 to 3. the default is 3.
43.4.6 IPSec Parameters
The Internet Protocol security (IPSec) parameters are described in the table below.
Table 43-25: IPSec Parameters
Parameter Description
IPSec Parameters
Web: Enable IP Security
EMS: IPSec Enable
[EnableIPSec]
Enables IPSec on the device.
ï‚§ [0] Disable (default)
ï‚§ [1] Enable
Note: For this parameter to take effect, a device reset is required.
IPSec Associations Table
Web: IP Security
Associations Table
EMS: IPSec SA Table
[IPSecSATable]
This table parameter defines the IPSec SA table. This table allows you to
configure the Internet Key Exchange (IKE) and IP Security (IPSec)
protocols. You can define up to 20 IPSec peers.
The format of this parameter is as follows:
[ IPsecSATable ]
FORMAT IPsecSATable_Index =
IPsecSATable_RemoteEndpointAddressOrName,
IPsecSATable_AuthenticationMethod, IPsecSATable_SharedKey,
IPsecSATable_SourcePort, IPsecSATable_DestPort,
IPsecSATable_Protocol, IPsecSATable_Phase1SaLifetimeInSec,
IPsecSATable_Phase2SaLifetimeInSec,
IPsecSATable_Phase2SaLifetimeInKB, IPsecSATable_DPDmode,
IPsecSATable_IPsecMode, IPsecSATable_RemoteTunnelAddress,
IPsecSATable_RemoteSubnetIPAddress,
IPsecSATable_RemoteSubnetPrefixLength,
IPsecSATable_InterfaceName;
[ \IPsecSATable ]
For example:
IPsecSATable 1 = 0, 10.3.2.73, 0, 123456789, 0, 0, 0, 0, 28800, 3600, ;
In the above example, a single IPSec/IKE peer (10.3.2.73) is configured.
Pre-shared key authentication is selected, with the pre-shared key set to