cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1278
Views
0
Helpful
3
Replies

ip ssh authentication-retries

chinpohpang851
Level 1
Level 1

ip ssh authentication-retries 3  by its name limits the no. of authentication attempts but what happen if I failed it 3 times? I can't find clear explanation on this. Any idea?

3 Replies 3

axeleratorcisco
Level 1
Level 1

I have the exact same question.

Is a client blocked permanently after 3 attempts?

If not permanently, then for how long exactly?

How do you restore access for that specific client again?

I know about the existence of the login block-for command, but i am not sure if these two commands are related?

I am also trying to google to find the answer to this.  Apparently no one knows...

 

hal-dean
Level 1
Level 1

Yes, ip ssh authentication-retries 3 blocks access to the device for the defined number of seconds as configured with login block-for 900 attempts 3 within 120, where 900 are the number of seconds to block the account (15 minutes), 3 is the number of failed login attempts, and 120 are the number of seconds between first and last unsuccessfull login attempts (2 min).

Yes, the command is used in conjunction with block-for to harden the switch or router. Per the DISA STIG the thesholds are below:
ip ssh authentication-retries 3
login block-for 900 attempts 3 within 120

The client is only blocked for the number of seconds configured, 900 seconds (15 minutes) when configured per the STIG. No user intervention is required to log back into the device once the timeout threshold has expired.