Console-Only Connections in NSM Overview

You can require the root device administrator to log in to the security device through the console port only. This restriction requires the root device admin to have physical access to the device to log in, preventing unauthorized persons from logging in remotely.

By default, this restriction is not enabled (the root device administrator can log in remotely). To restrict access to console only, select the Root Access Console Only check box in the CLI Management screen. When enabled, the managed device denies access to all Web UI, Telnet, or SSH connections for the root device administrator. This setting overrides the management options enabled on the ingress interface.

Note: This option does not appear for the Juniper Networks NSMXpress, which does not contain a console port.

Enabling the console-only setting does not affect the NSM–managed device connection.

Related Documentation