1.5.2.2 Limit Login Attempts

Information

The "Limiting Login Attempts" feature on Aruba AOS-CX switches is designed to enhance the security of the system by restricting the number of consecutive failed login attempts allowed for user accounts. Once the maximum number of failed attempts is reached, the account is blocked for a predetermined period - lockout-time. This local login attempt limiting feature is only available when not using remote authentication through AAA servers (TACACS+ or RADIUS) on any interface. Remote authentication through AAA servers (TACACS+ or RADIUS) is not possible when limit login attempts is configured on any interface.

Limiting login attempts on AOS-CX switches helps prevent brute-force attacks and unauthorized access, protecting critical network resources.

Solution

For the console interface (channel) only, enables console login attempt limiting. If the number of failedconsole login attempts equals the configured threshold, the user is locked out for the configuredduration -

switch(config)# aaa authentication console-login-attempts <ATTEMPTS> console-lockout-time <LOCKOUT-TIME>

For SSH/Telnet/https-server -

switch(config)# aaa authentication limit-login-attempts <ATTEMPTS> lockout-time <LOCKOUT-TIME>

Sample recommendation -

Enabling login attempt failure limiting with a 60 second lockout being triggered upon the thirdconsecutive login attempt failure -

switch(config)# aaa authentication console-login-attempts 3 console-lockout-time 60
switch(config)# aaa authentication limit-login-attempts 3 lockout-time 60

Impact:

This enhances security by safeguarding administrative accounts, reduces operational risks, and ensures compliance with security best practices.

See Also

https://workbench.cisecurity.org/benchmarks/24202