cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2238
Views
3
Helpful
14
Replies

brute force attack from VPN

Hi all,

I have been experiencing brute force attacks from outside VPN access. Luckily, I have enabled Duo MFA authentication and disabled web portal access

log.JPG

log2.JPG

However, I found out that people using Cisco secure clients keep accessing the VPN. May I know of any way to limit people's access to the VPN if the password is entered incorrectly more than 3 times and wait 5 to 10 mins?log3.JPG

1 Accepted Solution

Accepted Solutions

@chocolate2395777 I understand, but you don't have many options here. As already mentioned you could use the control-plane ACL, when you know the IP address of the attack, its not automated but it is an option.

View solution in original post

14 Replies 14

@chocolate2395777 that output looks to be from ISE, you can configure limit the number of consecutive failed login attempts per user in the external user database - Administration > Identity Management > Settings > User Authentication Settings > Lock/Suspend Account with Incorrect Login Attempts.

You could also use a control-plane ACL to restrict traffic from known malicous IP addresses and block them. https://integratingit.wordpress.com/2021/06/26/ftd-control-plane-acl/

You may wish to setup SYSLOG for message - 113015  https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide/syslogs1.html#con_4769508

 

Thanks for your reply.

The FTD is managed by FMC. I couldn't find any option to limit access for users with incorrect passwords,

 

@chocolate2395777 is the FMC the authentication source (local database)? You can restrict users when authenticating against external authentication sources. I don't believe there is anything on the FMC that can determine X number of incorrect logins and block.

@Rob Ingram I am using external authentication sources (AD). I have set it to lock the user after three incorrect password attempts to login. However, I am worried If the attacker continues attempting brute force attacks, it may lead to the consumption of hardware resources.

@chocolate2395777 I understand, but you don't have many options here. As already mentioned you could use the control-plane ACL, when you know the IP address of the attack, its not automated but it is an option.

When it comes to resources consumption, simple DoS to TCP/443 is much more dangerous than a slow password-guessing attack, although you're right that we don't really know how well DUO works under pressure.

Blocking users after 3 unsuccessful login attempts is not a good idea anyway. Cert+OTP authentication can help block attackers before login prompt and TLS/JA3 filtering on an external device can help block connects from scripts and allow them only from AnyConnect client.

 

I am seeing a similar issue and wanted to know more of what you meant by blocking TLS/JA3. Do you mean just restricting access to specific ports?

Google "TLS/JA3" and it will give you all you need.

Actually, it doesn't. I'm not asking to learn about JA3, I'm asking how would one block those protocols on a FTD, but still allow AnyConnect through. And never answer a post with, "Just google it." Have the decency to assume the person has already done research and are coming here for further assistance. Googling it is what got me to this forum post in the first place.

From my post: Cert+OTP authentication can help block attackers before login prompt and TLS/JA3 filtering on an external device can help block connects from scripts and allow them only from AnyConnect client.

You need another device in front of ASA/FTD which is capable of TLS/JA3 filtering.

 

 

Will Administration > Identity Management > Settings > User Authentication Settings > Lock/Suspend Account with Incorrect Login Attempts really limit the login for accounts in external databases (AD) ? My undestanding was upt o now it will limit logins for users created in ISE local database.

Since the implementation of certificate-based authentication and DUO, no instances of brute-force attacks have been recorded.

As I know for the FTD, using certificate + DUO authentication is the only way to stop brute-force attacks in my situation.

I believe IDP/IPS and threat intelligence can use JA3 to identify attacks for the FTD, but I haven't explored this myself.

@chocolate2395777, I don't want to upset you, but it was reported on this forum that it is possible to establish TLS connection to ASA/FTD having certificate without private key: https://community.cisco.com/t5/vpn/certificate-auth-not-validating-client-has-private-key/m-p/5123520#M295751

This basically means that certificates is not a panacea too, when it comes to password spray attacks. Fortunately, this "feature" has not been exploited yet, so far as I know.

 

Thanks for the advice, 

I am using an ISE user profiling and DUO will hopefully be able to block password spray attacks.