224 Appendix A: Password security

Access permissions

ICB Release 4 provides strict password protections and other mechanisms to restrict access from unauthorized personnel (see Table 58).

Table 58

Access permissions

Access type

Description of permissions

 

 

 

BUI

1

Login name and password. The login name is a combination of letters and digits

(HTTP server

 

up to 10 characters in length. The password consists of digits only. Define the

web access)

 

length according to the parameter “minimum password length”. Users and

 

 

administrators can change their passwords at any time.

 

2

The system does not permit multiple, simultaneous BUI sessions for the same

 

 

user. When a user logs into the BUI, no one else can login with the same user

 

 

ID, until the session terminates (that is, the user logs out).

 

 

The system permits only one administration session at a time. Therefore, if

 

 

there is an active administrator session, the system does not permit another

 

 

administrator log in.

 

3

You can access only the initial login window when you enter the BUI’s URL from

 

 

your web browser. You cannot access any other page or file directly.

 

4

The system times out and closes the session after a period of inactivity. The

 

 

administrator defines the time-out parameter.

 

 

 

CLI

1

There are two login levels. Each level has a login name and password, both of

(direct

 

which are changeable through the CLI. The name and password can contain

connection)

 

letters and digits.

 

2

The CLI does not print the password when it is being entered.

 

3

The system records every successful login as an information message in the

 

 

error log.

 

4

Upon a successful login, the CLI prints the login date and time.

 

5

The system times out and closes the session after a period of inactivity. The

 

 

administrator defines the time-out parameter.

 

 

 

Telnet

1

Remote access using telnet requires a dedicated login name and password.

(server access)

 

Successful login provides access to the CLI, which, in turn, requires its own

 

 

access and login as described above. The name and password can contain

 

 

letters and digits.

 

2

The system records every successful login as an informational message in the

 

 

error log. The CLI terminal prints this message.

 

3

The system times out and closes the session after a period of inactivity. The

 

 

administrator defines the time-out parameter.

 

 

 

553-3001-358/555-4001-135 Standard 02.00 July 2006

Page 224
Image 224
Nortel Networks 553-3001-358, 555-4001-135 manual Access permissions, Access type Description of permissions, Telnet