The SMG administrator would like to know if and how SMG can detect and log events such as “wrong attempt to access SMG.” In the GUI, they can see certain access logs, but they are unable to find any information related to SSH login attempts.
The requirement is to have an overview of whether someone has attempted to misuse SMG Linux.
SMG 10.8 10.9
To check SSH login attempts directly, administrators must review the secure log from the command line of the appliance.
Use the following command to display entries related to SSH activity (including failed login attempts): cat /data/logs/secure | grep sshd
SSH access is limited to the admin user.
Administrators can configure IP allow lists with the sshd-config command to restrict which IP addresses are permitted to connect via SSH.
This reduces the risk of unauthorized login attempts.