<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Stable FTD released version and fixed brute force attack in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5291267#M1121033</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Thanks for helpful commend.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 16 May 2025 06:24:03 GMT</pubDate>
    <dc:creator>Da ICS16</dc:creator>
    <dc:date>2025-05-16T06:24:03Z</dc:date>
    <item>
      <title>Stable FTD released version and fixed brute force attack</title>
      <link>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5291224#M1121030</link>
      <description>&lt;P&gt;Dear Team,&lt;/P&gt;
&lt;P&gt;We are looking the stable FTD version can upgrade to fixed the vulnerability and ensure it cover suck of attack like VPN brute force...and prevent AD Account locked out even attacker known the legit AD user.&lt;/P&gt;
&lt;P&gt;Kindly share commend / good practice to resolve it.&lt;/P&gt;
&lt;P&gt;Best Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2025 02:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5291224#M1121030</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2025-05-16T02:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: Stable FTD released version and fixed brute force attack</title>
      <link>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5291266#M1121032</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1636457"&gt;@Da ICS16&lt;/a&gt; the threat detection feature for remote access VPN services helps prevent Denial of Service (DoS) attacks and is supported in the following releases.&lt;/P&gt;
&lt;P&gt;These threat detection features are supported in the Cisco Secure Firewall Threat Defense versions listed next:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;7.0 version train&lt;/STRONG&gt;-&amp;gt; supported from&lt;STRONG&gt;&lt;SPAN&gt;7.0.6.3&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;and newer versions within this specific train.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;7.2 version train&lt;/STRONG&gt;-&amp;gt; supported from&lt;STRONG&gt;7.2.9&amp;nbsp;&lt;/STRONG&gt;and newer version within this specific train.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;7.4 version train&lt;/STRONG&gt;-&amp;gt; supported from&lt;STRONG&gt;&lt;SPAN&gt;7.4.2.1&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;and newer version within this specific train.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;7.6 version train&lt;/STRONG&gt;-&amp;gt; supported from&lt;STRONG&gt;7.6.0&amp;nbsp;&lt;/STRONG&gt;and any newer versions.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;7.4.2 is the current Cisco gold star version.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/222383-configure-threat-detection-for-remote-ac.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/222383-configure-threat-detection-for-remote-ac.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2025 06:13:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5291266#M1121032</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-05-16T06:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: Stable FTD released version and fixed brute force attack</title>
      <link>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5291267#M1121033</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Thanks for helpful commend.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2025 06:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5291267#M1121033</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2025-05-16T06:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: Stable FTD released version and fixed brute force attack</title>
      <link>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5291990#M1121059</link>
      <description>&lt;P&gt;I have found that changing your VPN login URL to a non-default value (e.g., vpn.company.com/corp instead of simply vpn.company.com) and sending the defaultWebVPN profile to a non-existent AAA server is the best protection against these attacks.&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2025 14:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5291990#M1121059</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-05-19T14:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: Stable FTD released version and fixed brute force attack</title>
      <link>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5292156#M1121073</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for commend. it is the workaround solution? Could you share doc/url me to review?&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 06:16:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5292156#M1121073</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2025-05-20T06:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Stable FTD released version and fixed brute force attack</title>
      <link>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5292194#M1121075</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco TAC is also recommended to upgrade to the current cisco golden star version. Did you tested and resolve the case from vpn bruteforce? thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 06:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5292194#M1121075</guid>
      <dc:creator>Da ICS16</dc:creator>
      <dc:date>2025-05-20T06:15:41Z</dc:date>
    </item>
    <item>
      <title>Re: Stable FTD released version and fixed brute force attack</title>
      <link>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5292262#M1121082</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1636457"&gt;@Da ICS16&lt;/a&gt; it's this solution:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html#toc-hId-1334521269" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html#toc-hId-1334521269&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Basically, valid users' profiles point to a non-published group-url. They use your legitimate authentication method. Non-legitimate users that try to go the the default profile are directed to either a. use certificates (which they won't have) or to a "sinkhole" (invalid) AAA server which will never authenticate them (nor affect any legitimate users' accounts).&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 12:09:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stable-ftd-released-version-and-fixed-brute-force-attack/m-p/5292262#M1121082</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-05-20T12:09:56Z</dc:date>
    </item>
  </channel>
</rss>

