CISC-ND-000150 - The Cisco switch must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must disconnect the session.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.

Solution

Configure the Cisco switch to enforce the limit of three consecutive invalid logon attempts as shown in the example below:

SW2(config)# ssh login-attempts 3

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_NX-OS_Switch_Y21M10_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7, CAT|II, CCI|CCI-000044, Rule-ID|SV-220480r802432_rule, STIG-ID|CISC-ND-000150, STIG-Legacy|SV-110607, STIG-Legacy|V-101503, Vuln-ID|V-220480

Plugin: Cisco

Control ID: f044d1caa28d7bd575c79fdef46977a6783010860f90b90fa4de838ce770216b