Configuring login attack prevention

The login attack prevention feature detects a login DoS attack if a user fails the maximum number of successive login attempts. The feature triggers the blacklist feature to add the user's IP to the blacklist. Following login attempts from the user is blocked for the block period. For login attack prevention to take effect, you must enable the global blacklist feature.

This feature can effectively prevent login DoS attacks.

To configure login attack prevention:

Step

Command

Remarks

1. Enter system view.

system-view

N/A

2. Enable login attack prevention.

attack-defense login enable

By default, login attack prevention is disabled.

3. Set the maximum number of successive login failures.

attack-defense login max-attempt max-attempt

The default value is three.

4. Set the block period during which a login attempt is blocked.

attack-defense login block-timeout minutes

The default value is 60 minutes.

5. Enable the global blacklist feature.

blacklist global enable

By default, the global blacklist feature is disabled.