6.6.1.5 Ensure Lockout-period is set to at least 30 minutes

Information

Users who have been disconnected due to bad login attempts should be locked out for 30 minutes.

Rationale:

Remote administration protocols like Telnet and SSH are commonly targeted by Brute Force or Dictionary attacks where a malicious user attempts to guess a valid username/password combination in order to gain control of the router.

To slow down the rate at which an attacker can attempt to guess passwords accounts disconnected by the tries-before-disconnect option should be locked out for a period of 30 minutes.

Solution

Configure the time users should be locked out using the following command under the [edit system] hierarchy:

[edit system]
user@host#set login retry-options lockout-period 30

Default Value:

By default users who are disconnected for multiple failed login attempts are not locked out.

See Also

https://workbench.cisecurity.org/files/3069

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2, CSCv7|16

Plugin: Juniper

Control ID: e17aa04403534aa353f6e3a2d036202b35d89252ccc8b1905ad1d7ef94d53289