top of page

Brute-force password attacks on VPN services

  • Writer: Aaron Magruder
    Aaron Magruder
  • Jan 2
  • 1 min read

Brute force password attacks on VPN services are leading to users being locked out of their accounts. These attempts occur so rapidly that an account, once unlocked, can be locked again within 10 seconds or less. Blocking IP ranges offers only a temporary solution because attackers have control over numerous bots, allowing a new login attempt to originate from a different IP as soon as one IP or network is blocked.


Suggested Mitigation Techniques for Cisco FTD and ASA.


1) Move from SSL VPN to IPSec VPN

2) Disable SSL VPN if possible or enable keep out in FMC/FTD so the username/password prompt is not displayed.

(Disabling the service will prevent the FTD from being able to deploy new client updates. Another software distirbuiton method for the VPN client will be needed.)

3) Upgrade to supported FTD code and enable Threat Detection on Remote Access VPN

4) Enable MFA


More information



Configure Threat Detection for Remote Access VPN Services on Secure Firewall Threat Defense



 
 
 

Comments


Kansas City Cisco Select Parnter

PO Box 282 | Lone Jack, MO 64070 

Tel: (816) 846-0676

© 2016 NonStop Networks, LLC

bottom of page