<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Maximum VPN Login Attemps using LDAP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/maximum-vpn-login-attemps-using-ldap/m-p/3753102#M8752</link>
    <description>&lt;P&gt;As far as I know, the lockout setting is done on the LDAP server and not the ASA.&lt;/P&gt;</description>
    <pubDate>Mon, 26 Nov 2018 21:46:07 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2018-11-26T21:46:07Z</dc:date>
    <item>
      <title>Maximum VPN Login Attemps using LDAP</title>
      <link>https://community.cisco.com/t5/network-security/maximum-vpn-login-attemps-using-ldap/m-p/3752865#M8751</link>
      <description>&lt;P&gt;Good Afternoon,&lt;BR /&gt;I have deployments made in many customers with ASA / Firepower of RAS, VPN, with authentication of users with the AD Username/Password and other profiles using Tokens (username - password + TOKEN)&lt;BR /&gt;Everything is working fine, but I discover that if wrong password are sent, the account is locked in the AD.&lt;BR /&gt;If some malicious actors decide to exploit this, using the logins of these users to proposition lock their accounts, it will cause problems in the infrasctuture.In older deployments, I believe we can lock with a value - Maximum vpn login attempts.&lt;BR /&gt;Is this option also to Firepower - this can mitigate the problem?&lt;BR /&gt;Because the lock is needed it, I don't want to disable this lockout after 10 attempts, or we have another problem, brute force à la carte. But the actual picture is not good either.&lt;BR /&gt;Can someone give some lights?&lt;BR /&gt;Thanks in advance!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:30:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/maximum-vpn-login-attemps-using-ldap/m-p/3752865#M8751</guid>
      <dc:creator>brunobaleizao27</dc:creator>
      <dc:date>2020-02-21T16:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: Maximum VPN Login Attemps using LDAP</title>
      <link>https://community.cisco.com/t5/network-security/maximum-vpn-login-attemps-using-ldap/m-p/3753102#M8752</link>
      <description>&lt;P&gt;As far as I know, the lockout setting is done on the LDAP server and not the ASA.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 21:46:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/maximum-vpn-login-attemps-using-ldap/m-p/3753102#M8752</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-11-26T21:46:07Z</dc:date>
    </item>
    <item>
      <title>Re: Maximum VPN Login Attemps using LDAP</title>
      <link>https://community.cisco.com/t5/network-security/maximum-vpn-login-attemps-using-ldap/m-p/3754224#M8753</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Marius, &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That is true,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;I&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;have the lockout configure in GPO for lock after 5&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;attempt&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;and unlock&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;automatically&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;after 30 min. But in my&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;infrastructure&lt;/SPAN&gt;&lt;SPAN&gt;, the LDAP Server is a domain controller, the problem is that this should be&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;configured&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;as it is, for all users. What&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;I&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;was&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;wondering&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;is that Firepower could block&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;attempt&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;logins for&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;a&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;user before the 5&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;attempt&lt;/SPAN&gt;&lt;SPAN&gt;. This way, the firewall could block brute force attacks and the user won't be lock in Active Directory. Like&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;I&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;say, if you brute force an active username in VPN Logins, from outside organization, the account will be&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;blocked&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;in AD, this is the problem. This could be maybe overcome with another LDAP Server, between the Domain Controller and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Firewall, or&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;we could do as good practice says,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;don't&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;use the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="hiddenSpellError"&gt;Samaccountname&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="hiddenGrammarError"&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;logon name in VPN but this may not be an option right now. I&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;thong&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;that Firepower have some way to mitigate this gap.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks in advance&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 10:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/maximum-vpn-login-attemps-using-ldap/m-p/3754224#M8753</guid>
      <dc:creator>brunobaleizao27</dc:creator>
      <dc:date>2018-11-28T10:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: Maximum VPN Login Attemps using LDAP</title>
      <link>https://community.cisco.com/t5/network-security/maximum-vpn-login-attemps-using-ldap/m-p/4898321#M1103228</link>
      <description>&lt;P&gt;We are currently setup the same way and Have A TAC escalated service ticket 695847390. Cisco has informed us that their Firepower solution cannot prevent this attack. The solution was to move our Paloalto to the perimeter and decommission our Firepower solution.&amp;nbsp; &amp;nbsp; "APT29 abused the Windows Credential Roaming in an attack."&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;</description>
      <pubDate>Thu, 03 Aug 2023 16:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/maximum-vpn-login-attemps-using-ldap/m-p/4898321#M1103228</guid>
      <dc:creator>Jeffrey Jost</dc:creator>
      <dc:date>2023-08-03T16:10:46Z</dc:date>
    </item>
  </channel>
</rss>

