<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;Remote access for ESXi local user account 'root'  has been locked for 120 seconds...&amp;quot; in ESXi Discussions</title>
    <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961556#M84644</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #666666; font-family: Arial, 'Microsoft YaHei', '\\5FAE软雅黑', '\\5B8B体', 'Malgun Gothic', Meiryo, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have the same problem.&lt;/SPAN&gt;Do you &lt;SPAN style="font-size: 10pt; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt; find &lt;SPAN style="color: #666666; font-family: Arial, 'Microsoft YaHei', '\\5FAE软雅黑', '\\5B8B体', 'Malgun Gothic', Meiryo, sans-serif;"&gt;a solution to the problem &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt;? &lt;/SPAN&gt;&lt;SPAN class="src" data-group="1-1" style="color: #666666;"&gt;Please tell me the solution,thank you.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 Jan 2019 02:50:37 GMT</pubDate>
    <dc:creator>SmilePeng</dc:creator>
    <dc:date>2019-01-24T02:50:37Z</dc:date>
    <item>
      <title>"Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961544#M84632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello everyone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got the following message every hour:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Remote access for ESXi local user account 'root'&amp;nbsp; has been locked for 120 seconds..."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found a lot of information how to figure this out:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Security.AccountLockFailures. Maximum number of failed login attempts before a user’s account is locked. Zero disables account locking.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Security.AccountUnlockTime. Number of seconds that a user is locked out.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;But I didn't get out where to &lt;/SPAN&gt;&lt;STRONG style="font-size: 10pt;"&gt;find the source IP&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; who is &lt;/SPAN&gt;trying&lt;SPAN style="font-size: 10pt;"&gt; to access our ESXi hosts. Isn't it in /var/log/auth.log ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your input.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Mar 2017 07:29:58 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961544#M84632</guid>
      <dc:creator>Trobinox</dc:creator>
      <dc:date>2017-03-02T07:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961545#M84633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using any management tools on your environment&amp;nbsp; .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This issue typically comes if any third party monitoring software that is unable to login and locks out the root user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use any monitoring tools slike Orion SolarWinds or TCPDump&amp;nbsp; to identify product/source which is causing the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Mar 2017 08:02:08 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961545#M84633</guid>
      <dc:creator>RAJ_RAJ</dc:creator>
      <dc:date>2017-03-02T08:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961546#M84634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's a customer environment, so I don't know exactly what they have for monitoring tools. That is why I'm asking for the file who contains the source IP. and such failed login logs. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Mar 2017 08:17:00 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961546#M84634</guid>
      <dc:creator>Trobinox</dc:creator>
      <dc:date>2017-03-02T08:17:00Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961547#M84635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The log file you are looking for is /var/log/auth.log.&lt;/P&gt;&lt;P&gt;More information can be found in this KB article, &lt;A href="https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&amp;amp;cmd=displayKC&amp;amp;externalId=2004810" title="https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&amp;amp;cmd=displayKC&amp;amp;externalId=2004810"&gt;https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&amp;amp;cmd=displayKC&amp;amp;externalId=2004810&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Mar 2017 08:19:08 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961547#M84635</guid>
      <dc:creator>erikverbruggen</dc:creator>
      <dc:date>2017-03-02T08:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961548#M84636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;Try below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Login to the ESXi console and ran this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# less /var/log/auth.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see below example when I given wrong password second time it triggered error message &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2017-03-02T08:30:57Z sshd[751607]: Connection from 192.168.1.50 port 55000&lt;/P&gt;&lt;P&gt;2017-03-02T08:31:02Z sshd[751607]: Accepted keyboard-interactive/pam for root from 10.20.2.17 port 55000 ssh2&lt;/P&gt;&lt;P&gt;2017-03-02T08:31:02Z sshd[751607]: pam_unix(sshd:session): session opened for user root by (uid=0)&lt;/P&gt;&lt;P&gt;2017-03-02T08:31:02Z sshd[751610]: Session opened for 'root' on /dev/char/pty/t0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2017-03-02T08:31:34Z sshd[751644]: Connection from 192.168.1.50 port 55075&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2017-03-02T08:31:39Z sshd[751645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10.20.2.17&amp;nbsp; user=root&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2017-03-02T08:31:41Z sshd[751644]: error: PAM: Authentication failure for root from 192.168.1.50&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Mar 2017 08:33:56 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961548#M84636</guid>
      <dc:creator>RAJ_RAJ</dc:creator>
      <dc:date>2017-03-02T08:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961549#M84637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I happened to have to same issues on all my ESXi hosts roughly one month after Upgrading from ESXi 5.5 to ESXi 6.5.&lt;/P&gt;&lt;P&gt;I upgraded using Updating Manager and went from a Lenovo ESXi image for my IBM servers to a VMware generic ESXi image.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;/var/log/syslog.log&lt;/SPAN&gt; revealed a vendor script repeatedly running and failing.&lt;/P&gt;&lt;P&gt;Revoking the script from scheduled tasks (cron) fixed the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may want to have a look at your cron jobs with vi:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;$ vi vi /var/spool/cron/crontabs/root&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="ShRootLock.png"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/72362iFF1E0B4CA98A4552/image-size/large?v=v2&amp;amp;px=999" role="button" title="ShRootLock.png" alt="ShRootLock.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 May 2017 01:57:40 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961549#M84637</guid>
      <dc:creator>Enelass</dc:creator>
      <dc:date>2017-05-05T01:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961550#M84638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can check the event which gives you the IP address and also there is a new feature in 6.0 which has default account lockout. Pls find below URL for more info &lt;A href="https://www.v-front.de/2015/04/watch-out-esxi-60-introduces-root.html?m=1" title="https://www.v-front.de/2015/04/watch-out-esxi-60-introduces-root.html?m=1"&gt;https://www.v-front.de/2015/04/watch-out-esxi-60-introduces-root.html?m=1&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 May 2017 02:10:42 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961550#M84638</guid>
      <dc:creator>msripada</dc:creator>
      <dc:date>2017-05-05T02:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961551#M84639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am too having this this issue but just one of many hosts.&amp;nbsp; I am not sure if it is a DELL plugin or a SOLARWINDS plugin and since it does not tell me the IP I cant' find what is causing it.&amp;nbsp; I checked the ESXi shell and it is not enabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Sep 2017 12:21:50 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961551#M84639</guid>
      <dc:creator>cfizz34vmware</dc:creator>
      <dc:date>2017-09-21T12:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961552#M84640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;check the vobd.log in the ESXi host after taking putty session and it should give the ip address or check the hostd.log which gives the login failure with ip address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Sep 2017 02:08:47 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961552#M84640</guid>
      <dc:creator>msripada</dc:creator>
      <dc:date>2017-09-22T02:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961553#M84641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I keep seeing this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 2px; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt;I keep seeing this and getting lockouts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 2px; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt;2017-10-16T07:51:40Z ^T: pam_unix(openwsman:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=&amp;nbsp; user=root&lt;/P&gt;&lt;P style="margin: 2px; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt;2017-10-16T07:51:43Z ^T: pam_tally2(openwsman:auth): user root (0) tally 7869, deny 5&lt;/P&gt;&lt;P style="margin: 2px; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt;2017-10-16T07:51:43Z addVob[1256326]: Could not expand environment variable HOME.&lt;/P&gt;&lt;P style="margin: 2px; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt;2017-10-16T07:51:43Z addVob[1256326]: Could not expand environment variable HOME.&lt;/P&gt;&lt;P style="margin: 2px; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt;2017-10-16T07:51:43Z addVob[1256326]: DictionaryLoad: Cannot open file "/usr/lib/vmware/config": No such file or directory.&lt;/P&gt;&lt;P style="margin: 2px; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt;2017-10-16T07:51:43Z addVob[1256326]: DictionaryLoad: Cannot open file "~/.vmware/config": No such file or directory.&lt;/P&gt;&lt;P style="margin: 2px; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt;2017-10-16T07:51:43Z addVob[1256326]: DictionaryLoad: Cannot open file "~/.vmware/preferences": No such file or directory.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Oct 2017 18:43:02 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961553#M84641</guid>
      <dc:creator>cfizz34vmware</dc:creator>
      <dc:date>2017-10-16T18:43:02Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961554#M84642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the same problem, and can't find any log that contains the SOURCE of that failed logins! :smileyshocked:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vobd.log only contains the message "Remote access for ESXi local user account 'root' has been locked for 120 seconds" over and over, but no log file seems to have the source IP... how is it possible to find the problem?!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Mar 2018 14:30:58 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961554#M84642</guid>
      <dc:creator>vmjoe</dc:creator>
      <dc:date>2018-03-13T14:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961555#M84643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try rhttpproxy or hostd log for information &lt;STRONG&gt;same time as the vodb states&lt;/STRONG&gt;&lt;SPAN style="color: #666666; font-family: proxima-nova, Arial, sans-serif;"&gt;"Remote access for ESXi local user account 'root' has been locked for 120 seconds&lt;/SPAN&gt;... rhttpproxy should give you IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Mar 2018 23:21:40 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961555#M84643</guid>
      <dc:creator>msripada</dc:creator>
      <dc:date>2018-03-13T23:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961556#M84644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #666666; font-family: Arial, 'Microsoft YaHei', '\\5FAE软雅黑', '\\5B8B体', 'Malgun Gothic', Meiryo, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have the same problem.&lt;/SPAN&gt;Do you &lt;SPAN style="font-size: 10pt; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt; find &lt;SPAN style="color: #666666; font-family: Arial, 'Microsoft YaHei', '\\5FAE软雅黑', '\\5B8B体', 'Malgun Gothic', Meiryo, sans-serif;"&gt;a solution to the problem &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; font-family: proxima-nova, Arial, sans-serif; color: #666666;"&gt;? &lt;/SPAN&gt;&lt;SPAN class="src" data-group="1-1" style="color: #666666;"&gt;Please tell me the solution,thank you.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2019 02:50:37 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961556#M84644</guid>
      <dc:creator>SmilePeng</dc:creator>
      <dc:date>2019-01-24T02:50:37Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961557#M84645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the same issue and I can't figure out what is going...&lt;/P&gt;&lt;P&gt;It happened to me to a fresh installation of ESXi 6.5 U2 - no monitoring tools etc. to the server, just configured an external syslog (Log Insight) to collect logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any further ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;T.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Mar 2019 17:50:24 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961557#M84645</guid>
      <dc:creator>afragop72</dc:creator>
      <dc:date>2019-03-06T17:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961558#M84646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to find the IP address via vCenter &amp;gt; click host &amp;gt; Monitor &amp;gt; Tasks &amp;amp; Events &amp;gt; Events.&amp;nbsp; Each failed logon would show the warning you see on the main summary screen, but also the failed logon attempt like "root@&amp;lt;source IP address&amp;gt;.&amp;nbsp; In my case, I wasn't familiar with the IP I was seeing (likely legacy stuff, this popped up after a root password change), so I modified the firewall settings for SSH and vSphere Web Access to only trust the IP ranges I actually trust.&amp;nbsp; 900 seconds later, good to go, warnings cleared.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP redacted below, but you get the idea.&amp;nbsp; I believe this was added to vSphere 6.x, FWIW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="pastedImage_1.png"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/8887iC0AFB8D2992578F8/image-size/large?v=v2&amp;amp;px=999" role="button" title="pastedImage_1.png" alt="pastedImage_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Mar 2019 23:52:56 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961558#M84646</guid>
      <dc:creator>plz1</dc:creator>
      <dc:date>2019-03-06T23:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961559#M84647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can I get a solution for this:&lt;/P&gt;&lt;P&gt;&lt;A href="https://communities.vmware.com/message/2983697"&gt;ESXi root password is getting locked frequently&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="518965_518965.png"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/84170iEDF965135E42B6C5/image-size/large?v=v2&amp;amp;px=999" role="button" title="518965_518965.png" alt="518965_518965.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="pastedImage_1.png"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/22975i7834851D98CA1B78/image-size/large?v=v2&amp;amp;px=999" role="button" title="pastedImage_1.png" alt="pastedImage_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ESXi root password is getting locked frequently&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found that no machine/agent is used to authenticate ESXi server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I rebooted ESXi several times.&lt;/P&gt;&lt;P&gt;Same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Earlier the ESXi version was:&lt;/P&gt;&lt;P&gt;VMware ESXi, 6.5.0, 8294253&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I even upgraded ESXi to patch but still seeing same issues:&lt;/P&gt;&lt;P&gt;VMware ESXi 6.5.0 build-16576891, Update 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[root@btp01esx16:/var/log] pam_tally2 --user root&lt;/P&gt;&lt;P&gt;Login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Failures Latest failure&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; From&lt;/P&gt;&lt;P&gt;root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 250&amp;nbsp;&amp;nbsp;&amp;nbsp; 09/14/20 05:29:57&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[root@btp01esx16:/var/log] pam_tally2 --user root --reset&lt;/P&gt;&lt;P&gt;Login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Failures Latest failure&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; From&lt;/P&gt;&lt;P&gt;root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 250&amp;nbsp;&amp;nbsp;&amp;nbsp; 09/14/20 05:29:57&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see following lines are continuosly recorded on /var/log/auth.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2020-09-13T04:49:32Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T05:49:32Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T05:49:32Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T06:49:33Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T06:49:33Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T07:49:33Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T07:49:34Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T08:49:34Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T08:49:34Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T09:49:35Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T09:49:35Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T10:49:35Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T10:49:36Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T11:49:36Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T11:49:36Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T12:49:37Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T12:49:37Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T13:49:37Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T13:49:38Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T14:49:38Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T14:49:38Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T15:49:39Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T15:49:39Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T16:49:40Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T16:49:40Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T17:49:40Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T17:49:41Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T18:49:41Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T18:49:41Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T19:49:42Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T19:49:42Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T20:49:42Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T20:49:42Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T21:49:43Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T21:49:43Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T22:49:44Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T22:49:44Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T23:49:44Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-13T23:49:45Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-14T00:49:45Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-14T00:49:45Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-14T01:49:46Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-14T01:49:46Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-14T02:49:46Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-14T02:49:47Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-14T03:49:47Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-14T03:49:47Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;P&gt;2020-09-14T04:49:48Z sshd[71851]: rekeyed outbound cipher&lt;/P&gt;&lt;P&gt;2020-09-14T04:49:48Z sshd[71851]: rekeyed inbound cipher&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Sep 2020 05:50:55 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/961559#M84647</guid>
      <dc:creator>iranna_totagi</dc:creator>
      <dc:date>2020-09-14T05:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: "Remote access for ESXi local user account 'root'  has been locked for 120 seconds..."</title>
      <link>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/2905794#M281260</link>
      <description>&lt;P&gt;It could be possible a remote machine is trying to access the host. If you are using a monitoring tool such as vCenter, enable a lockdown of the host so that you can only access the host via vCenter portal or the local host. Below is the steps to do so in vCenter 6.5:&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Select the host&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Click on Configure&lt;/P&gt;&lt;P&gt;3. Under System, select Security Profile&lt;/P&gt;&lt;P&gt;4. Under Lockdown Mode, select Edit&lt;/P&gt;&lt;P&gt;5. Choose Normal and ok&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 11:04:26 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/ESXi-Discussions/quot-Remote-access-for-ESXi-local-user-account-root-has-been/m-p/2905794#M281260</guid>
      <dc:creator>WongaD</dc:creator>
      <dc:date>2022-04-25T11:04:26Z</dc:date>
    </item>
  </channel>
</rss>

