API Guide

Limit concurrent login session commands
login concurrent-session limit
Configures the maximum number of concurrent login sessions allowed for a user ID.
Syntax
login concurrent-session limit number
Parameters limit number Enter the limit of concurrent login sessions, from 1 to 12.
Default 10 concurrent login sessions
Command Mode CONFIGURATION
Usage
Information
The total number of concurrent login sessions for the same user ID includes all console and remote
connections, where:
Each remote VTY connection counts as one login session.
All login sessions from a terminal emulator on an attached console count as one session.
The no version of the command disables the configured number of allowed login sessions.
Example
OS10(config)# login concurrent-session limit 7
Supported
Releases
10.4.1.0 or later
Virtual terminal line ACLs
To limit Telnet and SSH connections to the switch, apply access lists on a virtual terminal line (VTY).
There is no implicit deny rule. If none of the configured conditions match, the default behavior is to permit. If you need to deny
traffic that does not match any of the configured conditions, explicitly configure a deny statement.
1. Create IPv4 or IPv6 access lists with permit or deny filters; for example:
OS10(config)# ip access-list permit10
OS10(config-ipv4-acl)# permit ip 172.16.0.0 255.255.0.0 any
OS10(config-ipv4-acl)# exit
OS10(config)#
2. Enter VTY mode using the line vty command in CONFIGURATION mode.
OS10(config)# line vty
OS10(config-line-vty)#
3. Apply the access lists to the VTY line with the {ip | ipv6} access-class access-list-name command in LINE-
VTY mode.
OS10(config-line-vty)# ip access-class permit10
View VTY ACL configuration
OS10(config-line-vty)# show configuration
!
line vty
ip access-class permit10
ipv6 access-class deny10
OS10(config-line-vty)#
1048
Security