<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Terminal Server rather than user is in Intruder Lockout in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596555#M7101</link>
    <description>John,&lt;BR /&gt;real trouble is vms can't distinguish internal sessions on terminal server from external telnet sessions. So any solution can't solve completely.&lt;BR /&gt;I understand, Jan, deletes intrusion records of terminal server addresses, not all records. This is different by set LGI_BRK_LIM to infinite.&lt;BR /&gt;What is the best value of this parameter? We know standard value is 5; now if applied to a terminal server with 8 ports, I guess 50% of user can wrong their password, so 5*8/2=20. With 40 ports terminal server may be 5*40/2=100.&lt;BR /&gt;Obviusly each system administrator can decide keep more or then security level, so can apply 40% or 60% or any other value.&lt;BR /&gt;For me, Jan batch solution is not wrong and is not unsafe.&lt;BR /&gt; &lt;BR /&gt;Antonio Vigliotti&lt;BR /&gt;</description>
    <pubDate>Mon, 08 Aug 2005 01:28:50 GMT</pubDate>
    <dc:creator>Antoniov.</dc:creator>
    <dc:date>2005-08-08T01:28:50Z</dc:date>
    <item>
      <title>Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596541#M7087</link>
      <description>Running VMS 7.3-2 &lt;BR /&gt;&lt;BR /&gt;When a user's # of failed logins exceed the LGI_BRK_LIM, the Terminal Server device itself is locked out so no one else can login from any other terminals attached to the same Terminal Server.&lt;BR /&gt;&lt;BR /&gt;Source is: &lt;TS dns="" name=""&gt;::TELNET_0ADD94DA&lt;BR /&gt;&lt;BR /&gt;On our older system running VMS 6.1-2, &lt;BR /&gt;Source is: &lt;TS dns="" name=""&gt;::Username&lt;BR /&gt;&lt;BR /&gt;We are not running DECnet on the new server.&lt;BR /&gt;&lt;BR /&gt;The Terminal Servers are Xyplex boxes with 40 ports.&lt;BR /&gt;&lt;BR /&gt;LGI_BRK_TERM has been tried at both 0 &amp;amp; 1 with no difference.&lt;BR /&gt;&lt;BR /&gt;We want the individual User Account to be locked out, not the entire Terminal Server.&lt;BR /&gt;&lt;BR /&gt;Any ideas?&lt;BR /&gt;&lt;/TS&gt;&lt;/TS&gt;</description>
      <pubDate>Thu, 04 Aug 2005 07:58:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596541#M7087</guid>
      <dc:creator>Charles Goff</dc:creator>
      <dc:date>2005-08-04T07:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596542#M7088</link>
      <description>Charles,&lt;BR /&gt;&lt;BR /&gt;What is the output of "SHOW INTRUSION" when you&lt;BR /&gt;have the problem?&lt;BR /&gt;This will show the "source" of the intrusion and&lt;BR /&gt;possibly explain what you are seeing.&lt;BR /&gt;&lt;BR /&gt;Dave&lt;BR /&gt;</description>
      <pubDate>Thu, 04 Aug 2005 08:06:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596542#M7088</guid>
      <dc:creator>David B Sneddon</dc:creator>
      <dc:date>2005-08-04T08:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596543#M7089</link>
      <description>show intrusions shows this:&lt;BR /&gt;&lt;BR /&gt;Intrusion  Type  Count  Expiration&lt;BR /&gt;--------   ---   -----  -----------&lt;BR /&gt;Network   Intruder 10   25-jul-2005 08:5:27&lt;BR /&gt;&lt;BR /&gt;Source&lt;BR /&gt;-------&lt;BR /&gt;caxyplex.ca.us.pri.wyeth.com::TELNET_0ADD94DA&lt;BR /&gt;</description>
      <pubDate>Thu, 04 Aug 2005 08:15:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596543#M7089</guid>
      <dc:creator>Charles Goff</dc:creator>
      <dc:date>2005-08-04T08:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596544#M7090</link>
      <description>Charles,&lt;BR /&gt;&lt;BR /&gt;I assume the IP address of the terminal server is&lt;BR /&gt;10.221.148.218.&lt;BR /&gt;What protocol were you using to connect to the old&lt;BR /&gt;system running 6.1-2?&lt;BR /&gt;The intrusion is being identified as the above IP&lt;BR /&gt;address and since IP has no notion of username (as&lt;BR /&gt;DECnet does) then the intruder is considered to the&lt;BR /&gt;IP address i.e. any connection from that address.&lt;BR /&gt;&lt;BR /&gt;Dave&lt;BR /&gt;</description>
      <pubDate>Thu, 04 Aug 2005 08:29:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596544#M7090</guid>
      <dc:creator>David B Sneddon</dc:creator>
      <dc:date>2005-08-04T08:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596545#M7091</link>
      <description>You are correct on the IP address.&lt;BR /&gt;&lt;BR /&gt;We always use Telnet (TCP/IP) to connect, but there are observable differences in the Intrusion and Source fields.&lt;BR /&gt;&lt;BR /&gt;If I Telnet to the VMS6.1 system, and fail logins, the significant aspects of Show Intruder looks like this:&lt;BR /&gt;&lt;BR /&gt;Intrusion&lt;BR /&gt;--------&lt;BR /&gt;TERM_USER&lt;BR /&gt;&lt;BR /&gt;Source&lt;BR /&gt;--------&lt;BR /&gt;caxyplex.ca.us.pri.wyeth.com::TRAIN1</description>
      <pubDate>Thu, 04 Aug 2005 08:40:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596545#M7091</guid>
      <dc:creator>Charles Goff</dc:creator>
      <dc:date>2005-08-04T08:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596546#M7092</link>
      <description>Charles,&lt;BR /&gt;&lt;BR /&gt;When connecting to the 6.1-2 system, how does the&lt;BR /&gt;username correlate to the user/port?&lt;BR /&gt;Is it the username they are trying to login to or&lt;BR /&gt;the "name" assigned to the port?&lt;BR /&gt;One suggestion would be to track down the user&lt;BR /&gt;trying multiple times and "educate" them not to&lt;BR /&gt;keep trying if they fail three times... at that&lt;BR /&gt;point they should stop and seek assistance (or go &lt;BR /&gt;and have a coffee)&lt;BR /&gt;&lt;BR /&gt;Dave&lt;BR /&gt;</description>
      <pubDate>Thu, 04 Aug 2005 08:43:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596546#M7092</guid>
      <dc:creator>David B Sneddon</dc:creator>
      <dc:date>2005-08-04T08:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596547#M7093</link>
      <description>On the VMS 6.1 system , the Username and the Port (as seen Source field) are one and the same.&lt;BR /&gt;&lt;BR /&gt;The only thing I can figure is maybe there is some LAT traffic going back to the Terminal Server to query and obtain username.&lt;BR /&gt;&lt;BR /&gt;We are going to run some tests and look at network traffic.</description>
      <pubDate>Thu, 04 Aug 2005 08:54:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596547#M7093</guid>
      <dc:creator>Charles Goff</dc:creator>
      <dc:date>2005-08-04T08:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596548#M7094</link>
      <description>It simply looks like the old system sees all telnet sessions as TERM_USER types of intrusion class, while the new system sees all telnet sessions as NETWORK types.  &lt;BR /&gt;&lt;BR /&gt;The old system sees the source as DNS Name::Username, while the new sees it as DNS name::TCIPIP_&lt;HEX of="" ip="" address=""&gt;&lt;BR /&gt;&lt;BR /&gt;This is true, regardless of source of telnet session, and there is no LAT traffic going back to source.&lt;/HEX&gt;</description>
      <pubDate>Thu, 04 Aug 2005 09:45:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596548#M7094</guid>
      <dc:creator>Charles Goff</dc:creator>
      <dc:date>2005-08-04T09:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596549#M7095</link>
      <description>Sounds like it is time to educate the users about&lt;BR /&gt;how VMS handles login failures...&lt;BR /&gt;&lt;BR /&gt;Dave&lt;BR /&gt;</description>
      <pubDate>Thu, 04 Aug 2005 10:08:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596549#M7095</guid>
      <dc:creator>David B Sneddon</dc:creator>
      <dc:date>2005-08-04T10:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596550#M7096</link>
      <description>Charles,&lt;BR /&gt;&lt;BR /&gt;please read about the TCPIP$TELNET_NO_REM_ID logical - it may help.&lt;BR /&gt;&lt;BR /&gt;Use SHOW USER/FULL to find out on both systems, how TT_ACCPORNAM is set up (depending on the protocol used to login, e.g. LAT, DECnet, TCPIP).&lt;BR /&gt;&lt;BR /&gt;Volker.</description>
      <pubDate>Thu, 04 Aug 2005 10:24:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596550#M7096</guid>
      <dc:creator>Volker Halle</dc:creator>
      <dc:date>2005-08-04T10:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596551#M7097</link>
      <description>Charles,&lt;BR /&gt;&lt;BR /&gt;we faced the same problem.&lt;BR /&gt;&lt;BR /&gt;After some discussion with the Security Officer, we could agree that any user logging in from that source is NOT an external intruder.&lt;BR /&gt;&lt;BR /&gt;So, we created a batchjob that runs every 10 minutes to execute the command:&lt;BR /&gt;$ DELETE/INTRUSION &lt;TS dns="" name=""&gt;::TELNET_0ADD94DA.&lt;BR /&gt;Any intrusions FROM THIS IP are regularly deleted, any others are untouched.&lt;BR /&gt;&lt;BR /&gt;In the spirit of translated Dutch proverb:&lt;BR /&gt;"If it cannot be done the way it should, it should be done the way it can".&lt;BR /&gt;&lt;BR /&gt;hth,&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;jpe&lt;/TS&gt;</description>
      <pubDate>Thu, 04 Aug 2005 11:08:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596551#M7097</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2005-08-04T11:08:57Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596552#M7098</link>
      <description>Charles,&lt;BR /&gt;&lt;BR /&gt;  This is a clash of assumptions. &lt;BR /&gt;&lt;BR /&gt;  Intrusion detection depends on being able to identify the precise source of an intrusion suspect. For DECnet and LAT that's easy as both the node and user or port can be positively identified at fine granularity, it's part of the protocol.&lt;BR /&gt;&lt;BR /&gt;  For TELNET it's a problem, as TELNET protocol doesn't send a username or other unique identifier, just an IP address.&lt;BR /&gt;&lt;BR /&gt;  One mechanism is to use the TTY_ACCPORNAM string as the source. This includes both the address and the remote port number. Since the port number often varies per connection, this effectively defeats intrusion detection from telnet sources, as each new connection attempt will be seen as a new source.&lt;BR /&gt;&lt;BR /&gt;  Recent versions of TCPIP reverted to using the TELNET_&lt;IP-ADDRESS-IN-HEX&gt; format, which means all connections from the same IP address (host, terminal server, whatever) will be seen as the same source. So if one user drives the system into intrusion detection, all others from the same address are affected (this is also a Denial of Service risk).&lt;BR /&gt;&lt;BR /&gt;  As suggested by Volker, defining the /SYSTEM/EXEC logical name TCPIP$TELNET_NO_REM_ID will revert to the older mechanism (TTY_ACCPORNAM), but at the cost of reducing the effectivness of intrusion detection of real attacks (and let's be realistic here, most real attacks will be from IP sources, rather than DECnet or LAT).&lt;BR /&gt;&lt;BR /&gt;  It's all a tradeoff between security and potential inconvenience. Some of your options are:&lt;BR /&gt;&lt;BR /&gt;1) Revert to LAT for the terminal server.&lt;BR /&gt;   Pro: does exactly what you want&lt;BR /&gt;   Con(?): need to run LAT protocol &lt;BR /&gt;&lt;BR /&gt;2) Use TCPIP$TELNET_NO_REM_ID&lt;BR /&gt;   Pro: "fixes" your problem&lt;BR /&gt;   Con: Significantly reduced security from IP based attacks&lt;BR /&gt;&lt;BR /&gt;3) As Jan suggests, run a job to periodically clear intrusions for that source &lt;BR /&gt;  Pro: none! sorry Jan, I think it's an ugly kludge, which I don't recommend.&lt;BR /&gt;  Con: even more significantly reduced security from that source, additional management to maintain lists of "blessed" sources and make sure the job keeps running.&lt;BR /&gt;&lt;BR /&gt;4) Monitor intrusions more carefully - perhaps sending a page or SMS when one is detected, so it can be checked, and if found to be a false alarm, the intrusion can be cleared quickly.&lt;BR /&gt;  Pro: Means you'll also know immediately if you're under a real attack&lt;BR /&gt;  Con: Midnight pages for fumble fingered users?&lt;BR /&gt;&lt;BR /&gt;5) Raise LGI_BRK_LIM to a more reasonable number to reduce the chances that normal accidental login errors will trigger an intrusion. IMHO, the default of 5 is somewhat over paranoid. I don't believe system security would be seriously impaired with a threshold of (say) 50?&lt;BR /&gt;   Pro: Easy to do &lt;BR /&gt;   Con: Slightly reduced security&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;  Realisitically, an attacker will either know a valid password, or they will try a brute force dictionary attack. From that perspective the practical difference between an intruder thresholds of 5 or 50, or even 500 is negligible. So my usual recommendation for this situation is to increase the threshold. &lt;BR /&gt;&lt;BR /&gt;  You may want to take a more "scientific" approach to choosing a number. For example, you have 40 users, allow half of them 3 attempts within LGI_BRK_TMO, gives an LGI_BRK_LIM of 60.&lt;BR /&gt;&lt;BR /&gt;  Monitor intrusion suspects over time to find the "high water mark". Depending on how inaccurate your users are, you may be able to adjust the threshold downwards, without risking false intrusions.&lt;BR /&gt; &lt;BR /&gt;  The only issue you then have to deal with is a deliberate denial of service, but someone has to make 60 failed attempts to create one.&lt;/IP-ADDRESS-IN-HEX&gt;</description>
      <pubDate>Thu, 04 Aug 2005 21:17:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596552#M7098</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2005-08-04T21:17:21Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596553#M7099</link>
      <description>@John&lt;BR /&gt;&lt;BR /&gt;combine:&lt;BR /&gt;&lt;QUOTE&gt;&lt;BR /&gt;3) As Jan suggests, run a job to periodically clear intrusions for that source &lt;BR /&gt;Pro: none! &lt;BR /&gt;&lt;/QUOTE&gt;&lt;BR /&gt;and&lt;BR /&gt;&lt;QUOTE&gt;&lt;BR /&gt;Con: Midnight pages for fumble fingered users?&lt;BR /&gt;&lt;/QUOTE&gt;&lt;BR /&gt;&lt;BR /&gt;with a 5000 user, 365 * 24 environment; 98 + % of users coming in via named Citrix servers&lt;BR /&gt;, a daily count of cleared intrusions from those Citrixes varying between 20 and 60.&lt;BR /&gt;And yes, LGI_BRK_LIM is 25!&lt;BR /&gt;&lt;BR /&gt;Now YOU carry the pager for one night, (ehh, one tour of pager duty is a WEEK, rotating with 3 people) and I challenge you to repeat that "Pro: none!"&lt;BR /&gt;&lt;BR /&gt;The only SENSIBLE solution would be to clean up that sorry excuse for a network protocol that is forced upon us, and add a decent source identification to it.&lt;BR /&gt;&lt;BR /&gt;But this would introduce too much potential security, and in a predominantly M$ &amp;amp; *NIX world that is "not needed", if not a downright "breach of privacy".&lt;BR /&gt;&lt;BR /&gt;Sorry for blowing some vent, but I just had to.&lt;BR /&gt;&lt;BR /&gt;Nevertheless:&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have some on me.&lt;BR /&gt;&lt;BR /&gt;jpe</description>
      <pubDate>Fri, 05 Aug 2005 07:37:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596553#M7099</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2005-08-05T07:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596554#M7100</link>
      <description>Jan,&lt;BR /&gt;&lt;BR /&gt;&amp;gt;Now YOU carry the pager for one night,&lt;BR /&gt;&amp;gt;(ehh, one tour of pager duty is a WEEK,&lt;BR /&gt;&amp;gt;rotating with 3 people) and I challenge&lt;BR /&gt;&amp;gt;you to repeat that "Pro: none!"&lt;BR /&gt;&lt;BR /&gt;  You want to swap pager stories? Ha! Last week mine fired more than 80 times.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;a daily count of cleared intrusions &lt;BR /&gt;&amp;gt;from those Citrixes varying between 20 &lt;BR /&gt;&amp;gt;and 60. And yes, LGI_BRK_LIM is 25!&lt;BR /&gt;&lt;BR /&gt;  For those stats I'd recommend LGI_BRK_LIM be set much higher. Say 100? If your high water mark for normal activity is 60, then 100 should give you plenty of headroom to avoid false alarms, but more than sufficient to thwart any real dictionary attack.&lt;BR /&gt;&lt;BR /&gt;  The problem with a regular job to clear your intrusions is that it effectively increases LGI_BRK_LIM to infinite, with no way to detect a real attack. So, I repeat my assertion, "pro: none".&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 07 Aug 2005 17:03:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596554#M7100</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2005-08-07T17:03:38Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Server rather than user is in Intruder Lockout</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596555#M7101</link>
      <description>John,&lt;BR /&gt;real trouble is vms can't distinguish internal sessions on terminal server from external telnet sessions. So any solution can't solve completely.&lt;BR /&gt;I understand, Jan, deletes intrusion records of terminal server addresses, not all records. This is different by set LGI_BRK_LIM to infinite.&lt;BR /&gt;What is the best value of this parameter? We know standard value is 5; now if applied to a terminal server with 8 ports, I guess 50% of user can wrong their password, so 5*8/2=20. With 40 ports terminal server may be 5*40/2=100.&lt;BR /&gt;Obviusly each system administrator can decide keep more or then security level, so can apply 40% or 60% or any other value.&lt;BR /&gt;For me, Jan batch solution is not wrong and is not unsafe.&lt;BR /&gt; &lt;BR /&gt;Antonio Vigliotti&lt;BR /&gt;</description>
      <pubDate>Mon, 08 Aug 2005 01:28:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/terminal-server-rather-than-user-is-in-intruder-lockout/m-p/3596555#M7101</guid>
      <dc:creator>Antoniov.</dc:creator>
      <dc:date>2005-08-08T01:28:50Z</dc:date>
    </item>
  </channel>
</rss>

