Type: MAJOR

Object ID1.3.6.1.4.1.2879.2.8.1.7.1.12.0.16

Description

This trap is generated when an OS account is locked after a potential brute force attack.

Repetition

N/A

Objects


  • sonusAlarmNodeID
  • sonusAlarmLevel
  • sonusAlarmSequenceId
  • sonusAlarmTime
  • sonusAlarmDescription
  • sonusUserName
  • sonusUnlockType
  • sonusAlarmNodeName
  • sonusAlarmPodName
  • sonusAlarmContainerName
  • sonusAlarmNsUuid
  • sonusAlarmCnfUuid
  • sonusAlarmCnfcUuid

Action

Wait until the OS account is automatically unlocked, or is manually enabled, before attempting to access the account.

Impact

The OS account is not accessible until unlocked.

Clearing

Automatic

  • sonusSystemSecurityOsAccountAutoReEnabledCnf
Note

Account lockout status and number of failed login attempts are preserved even after the server is rebooted. The 'linuxadmin' account is locked like other OS accounts, but only for about 10 seconds, and will then unlock automatically.