Setting The Security Functions; Setting Login Policies - Hitachi CE50-10 Instruction Manual

Table of Contents

Advertisement

5. Configuring Software Environment
5.12 Setting the security functions
You can use the following functions to safely operate the unit.
Table 5‒13: Security functions
Function name
Login policy
Password policy
Firewall
5.12.1 Setting login policies
You can specify the following settings for users who log in to the unit:
• Root account login
• Account lock for a failed login
• Login timeout
(1) Setting root account login
This function permits (enables) or rejects (disables) login with the root account. This function is disabled by default.
(a) Enabling root login
1. Set a password for the root account.
Use the passwd command to set the password.
$ sudo passwd
New password: <- Enter the password (the entered character string is not displayed)
.
Retype new password: <- Enter the password again (the entered character string is n
ot displayed).
passwd: password updated successfully
2. Enable login with the root account.
The following example shows how to run the command.
$ sudo passwd -u root
passwd: password expiry information changed.
3. (Optional) To enable root login via ssh, edit the SSH configuration file.
$ sudo vi /etc/ssh/sshd_config
4. (Optional) In the sshd_config file, change the setting of the PermitRootLogin option from no to yes.
PermitRootLogin
5. (Optional) After editing the SSH configuration file, you can enable the settings by running the following
command.
$ sudo systemctl restart ssh
(b) Disabling root login
Change the login with the root account from enabled to disabled.
The following shows an example of running the command.
64
This function prevents unauthorized logins.
This function defines the length, complexity, and update period of passwords.
This function closes unused ports and blocks invalid packets.
no->yes
Description

Advertisement

Table of Contents
loading

Table of Contents