The Brute Force attacks are a major security threat to servers. The attackers are generally an automated software program that checks for all possible passwords and pass phrases on trial and error basis until the correct password is found. Alternatively, the attacker can attempt to guess the key, which is typically created from the password using a key derivation function.
To overcome these threats, the unsuccessful login attempts are reduced to 4. After 4 attempts, the User ID gets disabled by the server. Here the number of unsuccessful login attempts is sum of SSH and WEB UI login attempts. If a user is disabled from SSH login, the Web UI gets disabled too. For Example, If the user has two unsuccessful attempts from SSH and two from WEB UI, his ID gets locked by the server. The event where server locks the User ID, the action is recorded in an appropriate event log. The server automatically unlocks the User ID after 60 seconds and the user can can re-attempt to log on.
To know more about Brute Force Password Guessing, refer to Managing Default Groups and Passwords.
Follow these steps to know the defend against the Brute Force Password Guessing attempts:
Access SBC BMC GUI using a web browser. The BMC login screen is displayed.
Enter the wrong username and password for four consecutive attempts. The User gets locked and a message is displayed stating "User Is Locked, Please Try After 60 sec".