Information
If the configured limit is reached, the user is locked out (unable to log in) for a configurable period of time.
Rationale:
Locking out user IDs after n unsuccessful consecutive login attempts mitigate brute force password attacks against your systems.
Solution
Run the following command to set the deny-on-fail setting.
CLI:
Hostname>set password-controls deny-on-fail enable on
GUI:
Navigate to User Management > Password Policy > Deny Access After Failed Login Attempts:
Checked the 'Deny access after failed login attempts' setting.
Default Value:
Not selected