CCIE or Null!

My journey to CCIE!

4 Responses

Subscribe to comments with RSS.

  1. I see a lot of interesting posts on your website.
    You have to spend a lot of time writing, i know how to save you
    a lot of work, there is a tool that creates unique, google friendly articles in couple of minutes, just
    type in google – k2 unlimited content

    Rufus's avatar

    Rufus

    July 16, 2014 at 6:52 PM

  2. So what would be the end effect of a person brute forcing your router or switch login? What this effectively prevent any logins. So, for example, as I brute force attempt to discover the password, I’ll get locked out for 120 seconds and then my script will continue to run. After 120 seconds and then the next five failed, I would get locked out again? Would this not effectively render the switch or router in a lockout loop of sorts so not even legitimate users could login? Or, as long as I log in from a different host, I’m okay since it logs the source IP address. I may have just answered my own question.

    B Drew's avatar

    B Drew

    May 1, 2017 at 11:16 PM

    • Correct, as long you specify an access list for the ‘quiet mode’ configuration and attempt to connect from that configured network, you still have access to the router. While anyone not allowed in the quiet mode ACL will continue to be denied.

      This just designed to be a deterrent, since it can cannot stop the attack from continuing. This can however alert you to the incident with additional logging and alerting on your syslog server. This can provide valuable time to investigate the issue.

  3. “If you already have an access-class assigned to the VTY lines and quiet mode kicks in, the quiet mode ACL will be applied during the block-for time. However when the timer expires the quiet mode ACL is removed and the original ACL back in place.”

    So if I already have an ACL and access-class assigned to VTY lines to only allow login from the host address I specify, then that ACL and access-class will be replaced by quiet mode ACL if x number failed attempts from the allowed host address?

    I’m assuming the quiet mode ACL will be removed after the block-for-time has expired and my configured ACL and access-class will be re-applied?

    So this would config the router so x number of failed logins from the host address I already specified would trigger quiet mode and apply the newly configured quiet mode ACL (same allowed host IP address)?

    Paddy's avatar

    Paddy

    May 31, 2021 at 11:11 AM


Leave a reply to Stephen J. Occhiogrosso Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.