Configure session hijacking protection

Web management interface protects itself from session hijacking attacks binding web session to ip addresses and browser configurations. When it detects differences on these parameters it automatically destroys the session and records the error in the audit log. This feature is enabled by default and it can be disabled using this configuration:

Disable session hijacking protection

Products CMC, Guardian
Syntax conf.user configure ui session protection [true|false]
Description

Enable (option true, default behavior) or disable (option false) session hijacking protection.

Where CLI
To apply It is applied automatically
When closing sessions the web management interface will record in the audit log this error text
Session hijacking detected, closing session
and the details of the affected session.