Specifications
Terminal (Program Port/Telnet) Commands
106
 NetLinx Integrated Controllers- WebConsole & Programming Guide (FMv3) 
Terminal Commands (Cont.)
Command Description
SET SECURITY PROFILE (Cont.) Secure:
• Unsecured interface ports are disabled including HTTP, Telnet and FTP. 
Only HTTPS and SSH and terminal user ports are available.
• All user access requires a username/password login including HTTPS, 
SSH and terminal.
• NetLinx/ICSP security is enabled requiring all NetLinx devices 
connecting with the Master to provide username/password 
authentication and encryption.
• Passwords must conform to a stricter set of requirements. They must be 
at least 8 characters long and contain at least one upper and one lower 
case alpha, one numeric and one special character (excluding the 
blankspace ' ').
• Passwords cannot contain back-to-back duplicate characters.
• To ensure all account passwords conform to the new standard, all 
existing user accounts are deleted and the built-in 'administrator' and 
'netlinx' account passwords are set to the secure default of 'Amx1234!'
• Failed login attempts will force a 4 second delay before a subsequent 
login attempt can occur.
• Three consecutive login failures from any location will cause a 15 
minute lockout for the specified user account.
• If a banner.txt file is present in the Master's /user directory, the text from 
the banner.txt file will be included on the Master's Web login prompt.
• All user account access will be timed out after at most 15 minutes of 
inactivity by the user. Any activity after the timeout will cause the login 
prompt to be displayed and login will be required to regain access. 
The inactivity timer on an SSH and terminal session will be disabled if 
"msg on" logging is active.
• All account access including successful and failed logins and logouts 
will be recorded in persistent storage. Audit records will be retained for 
90 days. The current audit logs can be viewed via SSH or terminal 
sessions using the "show audit log" command. The audit log can be 
manually cleared from SSH or terminal session using the "clear audit 
log" command.










