Nortel Networks 555-4001-135 Server User Manual


 
224 Appendix A: Password security
553-3001-358/555-4001-135 Standard 02.00 July 2006
Access permissions
ICB Release 4 provides strict password protections and other
mechanisms to restrict access from unauthorized personnel (see Table
58).
Table 58
Access permissions
Access type Description of permissions
BUI
(HTTP server
web access)
1 Login name and password. The login name is a combination of letters and digits
up to 10 characters in length. The password consists of digits only. Define the
length according to the parameter “minimum password length”. Users and
administrators can change their passwords at any time.
2 The system does not permit multiple, simultaneous BUI sessions for the same
user. When a user logs into the BUI, no one else can login with the same user
ID, until the session terminates (that is, the user logs out).
The system permits only one administration session at a time. Therefore, if
there is an active administrator session, the system does not permit another
administrator log in.
3 You can access only the initial login window when you enter the BUI’s URL from
your web browser. You cannot access any other page or file directly.
4 The system times out and closes the session after a period of inactivity. The
administrator defines the time-out parameter.
CLI
(direct
connection)
1 There are two login levels. Each level has a login name and password, both of
which are changeable through the CLI. The name and password can contain
letters and digits.
2 The CLI does not print the password when it is being entered.
3 The system records every successful login as an information message in the
error log.
4 Upon a successful login, the CLI prints the login date and time.
5 The system times out and closes the session after a period of inactivity. The
administrator defines the time-out parameter.
Telnet
(server access)
1 Remote access using telnet requires a dedicated login name and password.
Successful login provides access to the CLI, which, in turn, requires its own
access and login as described above. The name and password can contain
letters and digits.
2 The system records every successful login as an informational message in the
error log. The CLI terminal prints this message.
3 The system times out and closes the session after a period of inactivity. The
administrator defines the time-out parameter.