Use the Brute Force Attack OS window to configure options related to preventing brute force attacks against the Linux operating system (OS).

Brute force attacks are a major security threat to servers whereby the attacker (generally an automated software program) systematically checks all possible passwords and pass-phrases on a trial-and-error basis until the correct one is found. Alternatively, the attacker can attempt to guess the key, which is typically created from the password using a key derivation function. A defense against this is to limit the number of consecutive unsuccessful login attempts on the system, after which the user ID is automatically locked. 

The SBC account management Brute Force Attack OS controls allow an administrator to limit the number of consecutive failed OS login attempts before the account is locked and to specify how long to keep the account locked.

On the SBC main screen, navigate to All > System > Admin > Account Management > Brute Force Attack OS. The Brute Force Attack OS window opens.


Use the following table when setting brute force attack OS options and click Save.


Brute Force Attack OS Paramters

Parameter

Length/Range

Description

OS StateN/A

Enable this flag to defend the Linux OS against brute force attacks.

  • Disabled
  • Enabled (default)
Consecutive Failed OSAttempt Allowed1-10Specifies the number of consecutive failed login attempts allowed before the account is locked. The default value is 3 attempts.

Allow OSAuto Unlock

N/AEnable this flag to automatically unlock the Linux OS account after a configurable number of seconds set by the Unlock OSTime parameter.
  • Disabled
  • Enabled (default)
Unlock OSTime

30-5400

Specifies the time interval, in seconds, after which the disabled Linux OS account will automatically unlock. The default value is 30 seconds.



  • No labels