<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Brute-force attack (auto login) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/4737271#M578788</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/318085"&gt;@axeleratorcisco&lt;/a&gt; for blocking brute force attacks against a switch/router for device administration, you can control this from the switch/router using the command "login block-for X attempts X within X".&lt;/P&gt;</description>
    <pubDate>Mon, 12 Dec 2022 17:23:08 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-12-12T17:23:08Z</dc:date>
    <item>
      <title>Brute-force attack (auto login)</title>
      <link>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/3500254#M539274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How does ISE handle brute-force attacks ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Lennert &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2016 07:12:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/3500254#M539274</guid>
      <dc:creator>lvanwaye</dc:creator>
      <dc:date>2016-04-04T07:12:14Z</dc:date>
    </item>
    <item>
      <title>Re: Brute-force attack (auto login)</title>
      <link>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/3500255#M539277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lennert,&lt;/P&gt;&lt;P&gt;For repeated 802.1X failures, ISE features anomalous client detection where admin can deny access from the endpoint for predetermined period (Default 1 hour). There are settings on the NADs, that also addresses such behavior from the client devices. Cisco WLC has client exclusion policies and Cisco IOS switches can leverage 802.1X settings to rate-limit authentication requests. Also the identity database such as AD can be configured to disable accounts after X number of unsuccessful authentication attempts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hosuk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2016 14:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/3500255#M539277</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2016-04-04T14:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: Brute-force attack (auto login)</title>
      <link>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/3500256#M539279</link>
      <description />
      <pubDate>Sun, 09 Aug 2020 05:00:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/3500256#M539279</guid>
      <dc:creator>v_cheriyan@qp.com.qa</dc:creator>
      <dc:date>2020-08-09T05:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Brute-force attack (auto login)</title>
      <link>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/3500257#M539281</link>
      <description />
      <pubDate>Sun, 09 Aug 2020 04:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/3500257#M539281</guid>
      <dc:creator>v_cheriyan@qp.com.qa</dc:creator>
      <dc:date>2020-08-09T04:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Brute-force attack (auto login)</title>
      <link>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/4737253#M578786</link>
      <description>&lt;P&gt;Is this feature also applicable to Device Administration via Tacacs+, with an AD joined domain which contains the accounts of the ISE administrators?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 16:55:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/4737253#M578786</guid>
      <dc:creator>axeleratorcisco</dc:creator>
      <dc:date>2022-12-12T16:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: Brute-force attack (auto login)</title>
      <link>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/4737271#M578788</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/318085"&gt;@axeleratorcisco&lt;/a&gt; for blocking brute force attacks against a switch/router for device administration, you can control this from the switch/router using the command "login block-for X attempts X within X".&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 17:23:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/4737271#M578788</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-12T17:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: Brute-force attack (auto login)</title>
      <link>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/4737611#M578807</link>
      <description>&lt;P&gt;Thanks Rob!&lt;/P&gt;&lt;P&gt;So on ISE there is no specific functionality for this? (Akin to anomolous client detection for 802.1x)&lt;/P&gt;&lt;P&gt;And thus no possibility of "quarantaining" the offending host via a function of ISE?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 07:38:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/brute-force-attack-auto-login/m-p/4737611#M578807</guid>
      <dc:creator>axeleratorcisco</dc:creator>
      <dc:date>2022-12-13T07:38:37Z</dc:date>
    </item>
  </channel>
</rss>

