Information
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
Solution
Step 1: Configure the router to use an authentication server as shown in the following example:
RP/0/0/CPU0:R3(config)#radius-server host 10.1.3.16 key xxxxxxxx
Step 2: Configure the authentication order to use the authentication server as primary source for authentication as shown in the following example:
RP/0/0/CPU0:R3(config)#aaa authentication login LOGIN_AUTHENTICATION group radius local
Step 3: Configure all network connections associated with a device management to use an authentication server for the purpose of login authentication as shown in the following example:
RP/0/0/CPU0:R3(config)#line default
RP/0/0/CPU0:R3(config-line)#login authentication LOGIN_AUTHENTICATION
RP/0/0/CPU0:R3(config-line)#exit
RP/0/0/CPU0:R3(config)#line console
RP/0/0/CPU0:R3(config-line)#login authentication LOGIN_AUTHENTICATION