Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Add_workflow_for_techpubs
AUTH1UserResourceIdentifier{userKey=8a00a0c86820e56901685f374974002d, userName='null'}
JIRAIDAUTHSBX-102825
REV5UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cb8305e9, userName='null'}
REV6UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cb8305e9, userName='null'}
REV3UserResourceIdentifier{userKey=8a00a0c85652e498015669b485df0004, userName='null'}
REV1UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26c99d02be, userName='null'}

...



Type: MAJOR

Object ID1.3.6.1.4.1.2879.2.8.1.2.1.12.0.16

Description

This alarm is generated when an OS account is locked after a potential brute force attack.

Repetition

N/A

Event Codes

sonusAlarmNodeID
sonusAlarmLevel
sonusAlarmSequenceId
sonusAlarmTime
sonusAlarmDescription
sonusUserName
sonusUnlockType

Instance Fields

sonusUserName
sonusUnlockType

Action

Wait until the OS account is automatically unlocked, or is manually enabled, before attempting to access the account.

Impact

The OS account is not accessible until unlocked.

Clearing

...

Automatic; sonusSystemSecurityOsAccountAutoReEnabled


Info
titleNote

Account lockout status and number of failed login attempts are preserved even after the server is rebooted. The 'linuxadmin' account

...

is locked like other OS accounts, but only for about 10 seconds, and will then unlock automatically.

Pagebreak