InformationIf the configured limit is reached, the user is locked out (unable to log in) for a configurable period of time.
Locking out user IDs after n unsuccessful consecutive login attempts mitigate brute force password attacks against your systems.
SolutionRun the following command to set the deny-on-fail setting.
Hostname>set password-controls deny-on-fail enable on
Navigate to User Management > Password Policy > Deny Access After Failed Login Attempts:
Checked the 'Deny access after failed login attempts' setting.