DO NOT SHARE THESE DOCS WITH CUSTOMERS!
This is an LA release that will only be provided to a select number of PLM-sanctioned customers (PDFs only). Contact PLM for details.
Use the Brute Force Attack OS window to configure options related to preventing brute force attacks against the Linux operating system (OS).
Brute force attacks are a major security threat to servers whereby the attacker (generally an automated software program) systematically checks all possible passwords and pass-phrases on a trial-and-error basis until the correct one is found. Alternatively, the attacker can attempt to guess the key, which is typically created from the password using a key derivation function. A defense against this is to limit the number of consecutive unsuccessful login attempts on the system, after which the user ID is automatically locked.
The SBC account management Brute Force Attack OS controls allow an administrator to limit the number of consecutive failed OS login attempts before the account is locked and to specify how long to keep the account locked.
On the SBC main screen, navigate to All > System > Admin > Account Management > Brute Force Attack OS. The Brute Force Attack OS window opens.
Use the following table to set brute force attack OS options and then click Save.