Technical data

212 Network OS Message Reference
53-1002489-01
SEC-3023
44
SEC-3023
Message <sequence-number> AUDIT, <timestamp>, [SEC-3023], INFO, SECURITY, <User
ID>/<Role>/<IP address>/<Interface>/<app name>,, <switch-name>, Event: <Event
Name>, Status: failed, Info: Account [<User>] locked, failed password attempts
exceeded.
Probable Cause Indicates that failed password attempts exceeded the allowed limit. The account has been locked
as a result.
Recommended
Action
The administrator may manually unlock the account.
Severity INFO
SEC-3024
Message <sequence-number> AUDIT, <timestamp>, [SEC-3024], INFO, SECURITY, <User
ID>/<Role>/<IP address>/<Interface>/<app name>,, <switch-name>, Event: <Event
Name>, Status: success, Info: User account [<User Name>], password changed.
Probable Cause Indicates the user's password was changed.
Recommended
Action
Verify the security event was planned. If the security event was planned, no action is required. If the
security event was not planned, take appropriate action as defined by your enterprise security
policy.
Severity INFO
SEC-3025
Message <sequence-number> AUDIT, <timestamp>, [SEC-3025], INFO, SECURITY, <User
ID>/<Role>/<IP address>/<Interface>/<app name>,, <switch-name>, Event: <Event
Name>, Status: success, Info: User account [<User Name>] added. Role: [<Role
Type>], Password [<Password Expired or not>], Home Context [<Home AD>], AD/VF list
[<AD membership List>].
Probable Cause Indicates a new user account was created.
Recommended
Action
Verify the security event was planned. If the security event was planned, no action is required. If the
security event was not planned, take appropriate action as defined by your enterprise security
policy.
Severity INFO