Details
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
Solution
Configure the Cisco router to enforce the limit of three consecutive invalid logon attempts as shown in the example below.
R2(config)#login block-for 900 attempts 3 within 120
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Cisco.
References
- 800-53|AC-7a.
- CAT|II
- CCI|CCI-000044
- Rule-ID|SV-215668r521266_rule
- STIG-ID|CISC-ND-000150
- STIG-Legacy|SV-105163
- STIG-Legacy|V-96025
- Vuln-ID|V-215668