<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: It is posible to stop Brute Force attacks in Firepower Theat Defen in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288068#M1120889</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Between 2FA, Certificate Authentication and IPS which one is better solution?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
    <pubDate>Tue, 06 May 2025 03:01:57 GMT</pubDate>
    <dc:creator>Da ICS16</dc:creator>
    <dc:date>2025-05-06T03:01:57Z</dc:date>
    <item>
      <title>It is posible to stop Brute Force attacks in Firepower Theat Defense?</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5161778#M1115118</link>
      <description>&lt;P&gt;Hello to everyone.&lt;/P&gt;&lt;P&gt;I have some doubts that arose as a result of Ethical Hacking carried out at my work, related to whether or not it is possible to stop brute force attacks on a site published from our on-premise network with FTD. Without going into too much detail, we have a dedicated link in which our clients connect to a site within our internal network, and asked how to stop brute force attacks against it in case one of our clients had their network compromised. They indicated that it can usually be done with a rate limit on the interface where traffic enters this published service. Checking the community I found this link that refers to the rate limit which is configured as a QoS policy:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/rate-limiting-on-ftd/td-p/3906667" target="_blank"&gt;Solved: Rate limiting on FTD - Cisco Community&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Correct me if I'm wrong, but I understood that these types of attacks are at the session layer, therefore they must be mitigated at the level of the server that provides this service, not at the communications or security level.&lt;/P&gt;&lt;P&gt;If it were possible to stop it in the firewall, how could it be done? Would it be with a QoS policy? Or through an ACL in the control policy that filters access to this interface where the communication passes?&lt;/P&gt;&lt;P&gt;Note:&amp;nbsp;This firewall is managed with an FMC.&lt;/P&gt;&lt;P&gt;Thank you very much in advance,&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2024 11:43:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5161778#M1115118</guid>
      <dc:creator>Vix-O-Ren</dc:creator>
      <dc:date>2024-08-16T11:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5162112#M1115131</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Check this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 17 Aug 2024 14:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5162112#M1115131</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-17T14:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5162408#M1115149</link>
      <description>&lt;P&gt;password spraying link is only for VPN.. not for another site (customer) coming in..&lt;/P&gt;
&lt;P&gt;you can do this:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/detecting_specific_threats.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/detecting_specific_threats.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;and based on some of these you can take action automatically like a shun etc&lt;/P&gt;
&lt;P&gt;also if you had a DDOS appliance they usually do a better job of even finding brute force.. the 41xx and higher platforms had a virtual DDOS.. Also tune your end application/servers to lock out after 5 attempts etc... so brute force can be prevented..&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 00:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5162408#M1115149</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-19T00:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5162542#M1115170</link>
      <description>&lt;P&gt;You cannot stop brute-force attacks in the firewall.&amp;nbsp; Depending on the rate these requests are coming at, QoS might help in rate-limiting the requests if you know the application and / or port being used.&amp;nbsp; But to mitigate this completely you would need to do that on the authenticating server (perhaps introduce 2factor authentication if not already in place)&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 10:02:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5162542#M1115170</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-08-19T10:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5162549#M1115171</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; -&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp; &amp;gt;...&lt;U&gt;You cannot stop brute-force attacks in the firewall.&lt;/U&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Well indeed you can't stop them at all (by 'words definition') ; I wonder wither products like&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;firepower could have&lt;STRONG&gt; auto-rate limiting&lt;/STRONG&gt;&amp;nbsp; or&lt;STRONG&gt; auto-dropping&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;from the attacking sources in such circumstances ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 10:27:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5162549#M1115171</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-08-19T10:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5162556#M1115173</link>
      <description>&lt;P&gt;Well, IPS in the FTD does have signature definitions for some specific brute-force attack types.&amp;nbsp; I suppose they will rate or drop attacks that match those specific signatures if those rules are enabled in IPS.&amp;nbsp; But since these are signatures they will be lagging a little bit when it comes to new attack types.&amp;nbsp; That&amp;nbsp; being said they are better than nothing.&lt;/P&gt;
&lt;P&gt;These signatures will of course help but the root of the problem needs to be addressed on the authenticating server, i.e. 2factor auth, certificate auth, limit access to specific users if possible, etc.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 10:48:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5162556#M1115173</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-08-19T10:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5166587#M1115414</link>
      <description>&lt;P&gt;In fact, the site uses 2fa when accessing the site, it asks to access the onmicrosoft portal, perfect, thank you very much for the help.&lt;BR /&gt;I understand that although it would comply by strengthening adding a rate limit, it would not mitigate the vulnerability 100%.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 15:06:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5166587#M1115414</guid>
      <dc:creator>Vix-O-Ren</dc:creator>
      <dc:date>2024-08-27T15:06:55Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5194997#M1115807</link>
      <description>&lt;P&gt;Control Plane ACLs can be leveraged &lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221457-configure-control-plane-access-control-p.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221457-configure-control-plane-access-control-p.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 19:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5194997#M1115807</guid>
      <dc:creator>daynagar</dc:creator>
      <dc:date>2024-09-16T19:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288068#M1120889</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Between 2FA, Certificate Authentication and IPS which one is better solution?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 03:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288068#M1120889</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2025-05-06T03:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288069#M1120890</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1154062"&gt;@Vix-O-Ren&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you test with 2FA and fixed no AD user locked out during brute force?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 03:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288069#M1120890</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2025-05-06T03:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288159#M1120902</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1636457"&gt;@Da ICS16&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;This depends on what you are trying to protect.&amp;nbsp; If it is a website purely for internal use, I would recommend all three,&amp;nbsp; Certificate and 2FA for authenticating to resources, and IPS to protect traffic further.&lt;/P&gt;
&lt;P&gt;If this is a public accessible website, I would recommend looking into segmenting the publicly accessible resources from the backend / internal resources if not done so already, with firewalling and access controls in place for internal resources.&amp;nbsp; And IPS to inspect traffic to the public resources.&amp;nbsp; In addition to this the public resources should be hardend and access right should be read only if they need access to internal databases so they cannot make any changes to internal resources.&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 09:21:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288159#M1120902</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2025-05-06T09:21:38Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288303#M1120909</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1636457"&gt;@Da ICS16&lt;/a&gt;&amp;nbsp;, In our case we use Symantec VIP Access, in simple words its similar to Cisco DUO. Its a Radius comunication beetween the MFA servers and the Firewalls.&lt;/P&gt;&lt;P&gt;In this specific case because the attacker uses random users like "cisco" or "tom" for example, they didn´t match any AD account.&lt;/P&gt;&lt;P&gt;And in the rare but possible scenario where the attacker somehow managed to find a user's name, they would have to try a few more times until they were blocked. At least from what I saw, the attack behavior was only a login attempt. When that failed, they continued with others. The methods we used to blocked this behavior completaly were three:&lt;BR /&gt;1) Remove the login on the webVPN platform&lt;BR /&gt;2) Enable internal buffer logs in the firewall to verify attacker attempts, users used, and IP addresses, comparing them with the radius logs&lt;BR /&gt;3) We used a FlexConfig policy to block these attacker IP addresses in ranges from /24 to /16. Through the firewall, we checked the geolocation of the attackers' public IPs, mostly from India and the Netherlands.&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 16:28:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288303#M1120909</guid>
      <dc:creator>Vix-O-Ren</dc:creator>
      <dc:date>2025-05-06T16:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288411#M1120916</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1154062"&gt;@Vix-O-Ren&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your commend.&lt;/P&gt;&lt;P&gt;Any attack still occur and lead AD user locked out after your implementation?&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 01:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288411#M1120916</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2025-05-07T01:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288416#M1120917</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco TAC recommend with below.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Certificate-Based (Trusted Client) Authentication&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;–&amp;nbsp; Only endpoints presenting a valid client certificate can establish a VPN tunnel, so password guessing and AD account lockouts no longer apply. It scales naturally against broad-based attacks.&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to go? Prevent AD account locked out?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 02:05:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288416#M1120917</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2025-05-07T02:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288493#M1120919</link>
      <description>&lt;P&gt;When using certificate authentication, you are only basing your authentication on validity of the certificate, so accounts will not be locked out. I would recommend also using MFA together with certificate authentication.&lt;/P&gt;
&lt;P&gt;you could also use Dynamic Access Policies (DAP) to authenticate based on specific values within the certificate.&amp;nbsp; For example, CN, or SAN values, or other values for that matter.&lt;/P&gt;
&lt;P&gt;If you have ISE then I would recommend using ISE and not DAP for this certificate authentication.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 07:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288493#M1120919</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2025-05-07T07:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288870#M1120941</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Yes we use ISE for Auth.C &amp;amp; Auth.Z and Accounting rely on NGFW.&lt;/P&gt;&lt;P&gt;Could you share the URL of configure MFA with certificate authentication?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2025 01:46:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288870#M1120941</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2025-05-08T01:46:53Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288964#M1120947</link>
      <description>&lt;P&gt;Check out this Cisco document for configuration:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-32/222208-configure-ssl-vpn-authentication-through.html?utm_source=chatgpt.com" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-32/222208-configure-ssl-vpn-authentication-through.html?utm_source=chatgpt.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2025 07:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5288964#M1120947</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2025-05-08T07:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: It is posible to stop Brute Force attacks in Firepower Theat Defen</title>
      <link>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5289101#M1120960</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1636457"&gt;@Da ICS16&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;So far, none have been detected, but we've taken an additional step. We use Zabbix on our platform, so we send these attack attempt logs to Zabbix, which then sends an alert to email. A new log appears. You should consider that any attack attempt, if not blocked by the Control Plane ACL, will appear as a new log. This log can be sent to your monitoring platform, if you have one, and alerts can be sent to your email to add those new IP addresses or networks to Flex Config in Firepower with the Control Plane ACL, or directly to your Control Plane ACL, if, for example, you have an ASA.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If for some reason you cannot do this from the firewall itself, the other option is to have your own MFA send Syslog messages directly to a Syslog server for analysis.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Unfortunately I didn't find any more automated options in this topic.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2025 14:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/it-is-posible-to-stop-brute-force-attacks-in-firepower-theat/m-p/5289101#M1120960</guid>
      <dc:creator>Vix-O-Ren</dc:creator>
      <dc:date>2025-05-08T14:33:13Z</dc:date>
    </item>
  </channel>
</rss>

