10-13-2024 05:00 AM
Dear Team,
We are currently using AnyConnect VPN, with authentication for domain users managed through the RADIUS server.
Recently, we've noticed persistent brute-force attacks targeting non-existent user accounts from various countries.
Given our current setup on the ASA 5516 (version 9.12(4)2), is it possible to implement country-based whitelisting to restrict login attempts.
Alternatively, are there other solutions or best practices we could consider to enhance security?
Your recommendations and suggestions would be greatly appreciated.
Solved! Go to Solution.
10-13-2024 05:09 AM - edited 10-13-2024 05:28 AM
@ALI12 refer to this guide for more information, which is the latest recommendations from Cisco to protect from brute force attacks.
There is no Geolocation that can filter traffic "to" the ASA itself, you could configure a control-plane and allow or explictly deny certain networks, although not a great solution. Else install an FTD with Geolocation in front of the ASA or use an MFA which also has Geolocation functionality.
10-13-2024 05:09 AM - edited 10-13-2024 05:28 AM
@ALI12 refer to this guide for more information, which is the latest recommendations from Cisco to protect from brute force attacks.
There is no Geolocation that can filter traffic "to" the ASA itself, you could configure a control-plane and allow or explictly deny certain networks, although not a great solution. Else install an FTD with Geolocation in front of the ASA or use an MFA which also has Geolocation functionality.
10-13-2024 05:40 AM
Thank you, @Rob Ingram for sharing your insights!
which option do you think is better: control-plane or using FTD ?
10-13-2024 05:44 AM
@ALI12 The control-plane ACL on the ASA is not very scalable and a lot of effort to setup and maintain. Use an FTD with Geolocation in front of the ASA to permit/restrict traffic is the best solution, albeit there will be a cost involved.
10-13-2024 06:35 AM
Thank you so much; I truly appreciate it.
10-13-2024 04:51 AM
Dear Team,
We are currently using AnyConnect VPN, with authentication for domain users managed through the RADIUS server.
Recently, we've noticed persistent brute-force attacks targeting non-existent user accounts from various countries.
Given our current setup on the ASA 5516 (version 9.12(4)2), is it possible to implement country-based whitelisting to restrict login attempts.
Alternatively, are there other solutions or best practices we could consider to enhance security?
Your recommendations and suggestions would be greatly appreciated.
10-13-2024 05:02 AM
Dear Admin,
Could you please remove the topic I posted? I have already reposted it in the correct group, as shown below:
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide