Brute Force Login Prevention; Figure 2-40 Brute Force Login Prevention (Login Retry Lockout) Configuration Interface; Table 2-35 Login Retry Lockout Parameters - Tadiran Telecom aeonix TGW4 User Manual

Tgw sip-fxs/fxo gateway
Table of Contents

Advertisement

T G W S IP -F X S /F S O G a te w a y S e rie s

2.7.3 Brute Force Login Prevention

A brute force login attack makes multiple login attempts within a short time period, trying to guess the
password to login.
To prevent brute force login attacks, the TGW provides several methods including CAPTCHA for
logging into Web GUI, limiting the number of login attempts, and access whitelist of trusted IP addresses.
Login Retry Lockout Configuration
After a specified number of login attempts within a specified time, the source IP address of the accessor
will be blocked.
After login, choose Security > Brute force login prevention, to go to the configuration interface.
Brute Force Login Prevention (Login Retry Lockout) Configuration Interface
Figure 2-40

Table 2-35 Login Retry Lockout Parameters

Name
Max. login failure
Lock time
Locked IP addresses
Tadiran Telecom
Description
Specify the maximum number of login failures allowed for a source IP address from which
login attempts are made to the Web GUI or SSH in a day. The IP addresses whose login
attempts exceeding the specified limit will be added to the locked list.
Value range: 1–5 times/day
Default value: 3 times/day
Specify the IP address lock time. An IP address will be unlocked after the lock time and is
allowed to access the device again.
Default value: 10 minutes
User Manual
83

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the aeonix TGW4 and is the answer not in the manual?

This manual is also suitable for:

Aeonix tgw8Aeonix tgw16Aeonix tgw24Aeonix tgw96

Table of Contents

Save PDF