The user-block reactive command sets the period for automatically activating blocked users.
The undo user-block reactive command restores the default period for automatically activating blocked users.
The user-block failed-times command enables the device to block users automatically when users consecutively type a specified number of incorrect passwords within a period.
The undo user-block failed-times command disables the device from blocking users automatically when users consecutively type a specified number of incorrect passwords within a period.
By default, the default value is 5 minutes and the system does not allow a user to log in any more if the user fails to be authenticated for five times in five minutes.
Parameter | Description | Value |
---|---|---|
period period-value |
Specifies the period when users consecutively type incorrect passwords. |
The value is an integer ranging from 1 to 120, in minutes. |
reactive reactive-time |
Specifies the period for automatically activating blocked users. |
The value is an integer ranging from 1 to 1000, in minutes. The default value is 5. If the value is 0, blocked users are not automatically activated. |
failed-times failed-times-value |
Specifies the maximum number of times that users consecutively type incorrect passwords. |
The value is an integer ranging from 0 to 10. The default value is 0, meaning that the device does not block users when users consecutively type incorrect passwords. |
Usage Scenario
The user-block failed-times command can be used to prevent the malicious users from cracking the user password. If an authorized user account is locked due to misoperation, the user-block reactive command can be used. These commands prevent malicious users from cracking the user password one one hand and minimize the influence on user services on the other hand.
A malicious user will try password authentication repeatedly to decrypt the user password. To prevent the user password from being decrypted, run the user-block failed-times command to set the maximum allowed number of successive authentication failures in a specified period of time. If the number of successive authentication failures of a local user in a set period exceeds the allowed number, the local user will be locked. That enhances password security.
Configuration Impact
Follow-up Procedure
he following two ways can be used to unlock the locked user account.