The Login Password Retry Lockout feature allows system administrators to lock out a local AAA user account after a configured
number of unsuccessful attempts by the user to log in using the username that corresponds to the AAA user account. A locked-out
user cannot successfully log in again until the user account is unlocked by the administrator.
A system message is generated when a user is either locked by the system or unlocked by the system administrator. The following
is an example of such a system message:
%AAA-5-USER_LOCKED: User user1 locked out on authentication failure.
The system administrator cannot be locked out.
Note |
The system administrator is a special user who has been configured using the maximum privilege level (root privilege--level
15). A user who has been configured using a lesser privilege level can change the privilege level using the enable command. A user that can change to the root privilege (level 15) is able to act as a system administrator.
|
This feature is applicable to any login authentication method, such as ASCII, Challenge Handshake Authentication Protocol
(CHAP), and Password Authentication Protocol (PAP).
Note |
No messages are displayed to users after authentication failures that are due to the locked status (that is, there is no distinction
between a normal authentication failure and an authentication failure due to the locked status of the user).
|