Network Router User Manual
Table Of Contents
- Router Platform User Interface Reference
- NAT Policy Page
- Router Interfaces Page
- Advanced Interface Settings Page
- AIM-IPS Interface Settings Page
- Dialer Policy Page
- ADSL Policy Page
- SHDSL Policy Page
- PVC Policy Page
- PPP/MLP Policy Page
- AAA Policy Page
- Accounts and Credential s Policy Page
- Bridging Policy Page
- Clock Policy Page
- CPU Policy Page
- HTTP Policy Page
- Console Policy Page
- VTY Policy Page
- Secure Shell Policy Page
- SNMP Policy Page
- DNS Policy Page
- Hostname Policy Page
- Memory Policy Page
- Secure Device Provisioning Policy Page
- DHCP Policy Page
- NTP Policy Page
- 802.1x Policy Page
- Network Admission Control Policy Page
- Logging Setup Policy Page
- Syslog Servers Policy Page
- Quality of Service Policy Page
- BGP Routing Policy Page
- EIGRP Routing Policy Page
- OSPF Interface Policy Page
- OSPF Process Policy Page
- RIP Routing Policy Page
- Static Routing Policy Page

Appendix K Router Platform User Interface Reference
VTY Policy Page
K-134
User Guide for Cisco Security Manager 3.2
OL-16066-01
Exec Timeout The amount of time (in seconds) that the EXEC command interpreter waits
to detect user input on the line. If no input is detected, the line is
disconnected. Valid values range from 0 to 2147483. The default is 600 (10
minutes). Setting the value to 0 disables the timeout.
Note Although the timeout is defined in seconds, it appears in the CLI in
the format [mm ss].
Input Protocols The protocols that you can use for incoming connections on this line:
• All—All supported protocols are permitted. Supported protocols
include LAT, MOP, NASI, PAD, rlogin, SSH, Telnet, and V.120.
• None—No protocols are permitted. This makes the port unusable by
incoming SSH, Telnet, and rlogin connections.
Note Setting the input protocols setting to None might prevent Security
Manager from connecting to the device after deployment. The device
can still be managed using SSL, if SSL is enabled in the HTTP
policy. See HTTP Page—Setup Tab, page K-111.
• Protocol—Enables one or more of the following protocols:
–
SSH—Secure Shell protocol.
–
Telnet—Standard TCP/IP terminal emulation protocol.
–
rlogin—UNIX rlogin protocol.
Note SSH and rlogin require that you configure AAA authentication. See
VTY Line Dialog Box—Authentication Tab, page K-136.
Note Not all IOS Software Versions support rlogin as an input protocol.
Table K-58 VTY Line Dialog Box—Setup Tab (Continued)










