<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Broute Force Protection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5029886#M1109531</link>
    <description>&lt;P&gt;Like&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291804"&gt;@Mark Elsen&lt;/a&gt;&amp;nbsp;mentioned, the NXOS does not provide these features. The only features related to brute-force attempts are related to logging:&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;nx9000-1(config)# login ?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;on-failure Set options for failed login attempt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;on-success Set options for successful login attempt&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Other IOS variants like IOS XE have the features that you asked about, as seen in the following output from a ISR 1K running IOS XE 17.9.4a:&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;c1111(config)#login ?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;block-for Set quiet-mode active time period&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;delay Set delay between successive fail login&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;on-failure Set options for failed login attempt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;on-success Set options for successful login attempt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;password-reuse-interval Set the number of days for reuse of password&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;password-warning-interval Set warning interval for user&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;quiet-mode Set quiet-mode options&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
    <pubDate>Thu, 29 Feb 2024 14:29:14 GMT</pubDate>
    <dc:creator>liviu.gheorghe</dc:creator>
    <dc:date>2024-02-29T14:29:14Z</dc:date>
    <item>
      <title>Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5029330#M1109523</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;we have&amp;nbsp;&lt;SPAN&gt;N5K-C5596UP model and we would like to implement a brouteforce protection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The protection probably should work by timing out more then ... failed attempted logins on SSH and RDP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Let me know kindly how to implement this and thank you in advance!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 09:14:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5029330#M1109523</guid>
      <dc:creator>edoardodepiet</dc:creator>
      <dc:date>2024-02-29T09:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5029740#M1109530</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- The switch will not natively provide such features ; if we look at network protection and prevention of storming security attacks in&amp;nbsp; general you need to look at firewalling solutions (to protect intr&lt;U&gt;&lt;STRONG&gt;a&lt;/STRONG&gt;&lt;/U&gt;net networking components) ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 13:03:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5029740#M1109530</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-02-29T13:03:28Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5029886#M1109531</link>
      <description>&lt;P&gt;Like&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291804"&gt;@Mark Elsen&lt;/a&gt;&amp;nbsp;mentioned, the NXOS does not provide these features. The only features related to brute-force attempts are related to logging:&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;nx9000-1(config)# login ?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;on-failure Set options for failed login attempt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;on-success Set options for successful login attempt&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Other IOS variants like IOS XE have the features that you asked about, as seen in the following output from a ISR 1K running IOS XE 17.9.4a:&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;c1111(config)#login ?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;block-for Set quiet-mode active time period&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;delay Set delay between successive fail login&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;on-failure Set options for failed login attempt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;on-success Set options for successful login attempt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;password-reuse-interval Set the number of days for reuse of password&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;password-warning-interval Set warning interval for user&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;quiet-mode Set quiet-mode options&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 14:29:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5029886#M1109531</guid>
      <dc:creator>liviu.gheorghe</dc:creator>
      <dc:date>2024-02-29T14:29:14Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5031851#M1109563</link>
      <description>&lt;P&gt;Can you please tell what are those options for:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;on-failure Set options for failed login attempt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;on-success Set options for successful login attempt&lt;/FONT&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this allow us to TIME OUT a certain IP after ... failed login attempts?&lt;/P&gt;&lt;P&gt;If this switch does not provide this solution, which firewall/hardware do you recommend for data center colocation?&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Edp&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 15:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5031851#M1109563</guid>
      <dc:creator>edoardodepiet</dc:creator>
      <dc:date>2024-03-01T15:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5031907#M1109567</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1693126"&gt;@edoardodepiet&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Can you please tell what are those options for:&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;on-failure Set options for failed login attempt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;on-success Set options for successful login attempt&lt;/FONT&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does this allow us to TIME OUT a certain IP after ... failed login attempts?&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The options allow you to have the switch generate SYSLOG messages on login failure or successful attempts. It doesn't allow you to delay or restrict a certain IP after repeated failed attempts.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;If this switch does not provide this solution, which firewall/hardware do you recommend for data center colocation?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The firewall model depends on what volume of traffic you expect it to handle.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 16:51:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5031907#M1109567</guid>
      <dc:creator>liviu.gheorghe</dc:creator>
      <dc:date>2024-03-01T16:51:47Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5032199#M1109579</link>
      <description>&lt;P&gt;Thank you again&lt;/P&gt;&lt;P&gt;The firewall model depends on what volume of traffic you expect it to handle.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Do you measure it in GBPS? Then please provide some tips for:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;30 - 50 GBPS&lt;/LI&gt;&lt;LI&gt;50 - 100 GBPS&lt;/LI&gt;&lt;LI&gt;100 - 500 GBPS&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;or the intervals you feel are relevant with the correct unit of measurement&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;</description>
      <pubDate>Sat, 02 Mar 2024 03:43:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5032199#M1109579</guid>
      <dc:creator>edoardodepiet</dc:creator>
      <dc:date>2024-03-02T03:43:58Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5032580#M1109582</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1693126"&gt;@edoardodepiet&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Firewall throughput is measured usually in Gigabits per second (Gbps). Keeping the intervals you mentioned, but in Gbps, you have:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;30 - 50 Gbps: Cisco 3100 Series ranging from 10 to 45 Gbps or Cisco 4100 Series&amp;nbsp;ranging from 19 to 53 Gbps&lt;/LI&gt;
&lt;LI&gt;50 - 100 Gbps: 4215 (71 Gbps) or 4225 (90 Gbps) or 9300 SM-40 (55 Gbps) or 9300 SM-48 (65 Gbps)&amp;nbsp;or 9300 SM-56 (70 Gbps)&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;100 - 500 Gbps: Cisco 4245 (149 Gbps) or Cisco 9300 3xSM-56 (190 Gbps)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Mar 2024 08:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5032580#M1109582</guid>
      <dc:creator>liviu.gheorghe</dc:creator>
      <dc:date>2024-03-02T08:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5040179#M1109897</link>
      <description>&lt;P&gt;Thank you soo much for those models. Do you know how can i check/if you know how many IPs those can handle in ACL and ROOT?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 21:26:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5040179#M1109897</guid>
      <dc:creator>edoardodepiet</dc:creator>
      <dc:date>2024-03-14T21:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5040196#M1109898</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1693126"&gt;@edoardodepiet&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;take a look at the following document, page 26-27:&amp;nbsp;&lt;A href="https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/BRKSEC-3455.pdf" target="_blank"&gt;https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/BRKSEC-3455.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Quite impressive.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 21:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5040196#M1109898</guid>
      <dc:creator>liviu.gheorghe</dc:creator>
      <dc:date>2024-03-14T21:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5047274#M1110243</link>
      <description>&lt;P&gt;Thank you soo much. Sorry but I am really noob on those topics. Which of those values should we consider for the 3 models you have sent? (Always reated your replies as Helpful)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="edoardodepiet_0-1711066339263.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/213571iA1E0EBFE65BBDA75/image-size/medium?v=v2&amp;amp;px=400" role="button" title="edoardodepiet_0-1711066339263.png" alt="edoardodepiet_0-1711066339263.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 00:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5047274#M1110243</guid>
      <dc:creator>edoardodepiet</dc:creator>
      <dc:date>2024-03-22T00:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5047532#M1110268</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1693126"&gt;@edoardodepiet&lt;/a&gt; there is a huge difference in cost between the models in the screenshots.&lt;/P&gt;
&lt;P&gt;What is your budget? What are your requirements for the Firewall? How many connections? What is the bandwidth of the connected internet circuits? Do you require basic L3/L3 filtering or NGFW L7 (Threat, Anti-Malware etc) functionality?&lt;/P&gt;
&lt;P&gt;Refer to the datasheets will give you an idea of the difference in performance of the hardware.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/firepower-1000-series/datasheet-c78-742469.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/firepower-1000-series/datasheet-c78-742469.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/firepower-2100-series/datasheet-c78-742473.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/firepower-2100-series/datasheet-c78-742473.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/firewalls/secure-firewall-3100-series-ds.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/firewalls/secure-firewall-3100-series-ds.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 08:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5047532#M1110268</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-22T08:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: Broute Force Protection</title>
      <link>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5047540#M1110269</link>
      <description>&lt;P&gt;Well, to summarise, you will have for:&lt;/P&gt;
&lt;P&gt;4100 series - between 2,250,000 and 3,000,000 ACE&lt;/P&gt;
&lt;P&gt;9300 series - between&amp;nbsp;2,250,000 and 6,000,000 ACE&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 08:05:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broute-force-protection/m-p/5047540#M1110269</guid>
      <dc:creator>liviu.gheorghe</dc:creator>
      <dc:date>2024-03-22T08:05:39Z</dc:date>
    </item>
  </channel>
</rss>

