Tripp Lite B0930082E4UV Owners Manual for B093- B097- and B098-Series Console - Page 22

Brute Force Protection

Page 22 highlights

3. System Configuration • In the example shown below, local administrators on local Management LAN have direct telnet access to the console server (and attached serial ports), while remote administrators using dial-in or cellular have no such telnet access (unless they set up a VPN). • Respond to ICMP echoes (i.e. ping) Service access options can be configured at this stage. This allows the console server to respond to incoming ICMP echo requests. Ping is enabled by default. However for security reasons, this service should generally be disabled post-initial configuration. • You can also configure to allow serial port devices to be accessed from assigned network interfaces using Raw TCP, direct Telnet/SSH, unauthenticated Telnet/SSH services, etc. • Click Apply to apply your services access selections. 3.4.1 Brute Force Protection Brute force protection (Micro Fail2ban) temporarily blocks source IPs that show malicious signs, such as too many password failures. This may help mitigate scenarios where the Tripp Lite device's network services are exposed to an untrusted network such as the public WAN, and scripted attacks or software worms are attempting to guess (brute force) user credentials and gain unauthorized access. Brute Force Protection may be enabled for the listed services. Once protection is enabled, three or more failed connection attempts within 60 seconds from a specific source IP trigger it to be banned from connecting for the next 60 seconds. Active Bans are also listed and may be refreshed by reloading the page. Note: When a Tripp Lite device is running on an untrusted network, it is recommended that a variety of strategies be used to lock down remote access. This includes strong passwords (or even better, SSH public key authentication), VPN, and using Firewall Rules to whitelist remote access from trusted source networks only. Refer to the Knowledge Base for details. 22

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288

22
• In the example shown below, local administrators on local Management LAN have direct telnet access to the console server
(and attached serial ports), while remote administrators using dial-in or cellular have no such telnet access (unless they set
up a VPN).
Respond to ICMP echoes
(i.e. ping) Service access options can be configured at this stage. This allows the console server
to respond to incoming ICMP echo requests. Ping is enabled by default. However for security reasons, this service should
generally be disabled post-initial configuration.
• You can also configure to allow serial port devices to be accessed from assigned network interfaces using Raw TCP, direct
Telnet/SSH, unauthenticated Telnet/SSH services, etc.
• Click
Apply
to apply your services access selections.
3.4.1 Brute Force Protection
Brute force protection (Micro Fail2ban) temporarily blocks source IPs that show malicious signs, such as too many password
failures. This may help mitigate scenarios where the Tripp Lite device’s network services are exposed to an untrusted network
such as the public WAN, and scripted attacks or software worms are attempting to guess (brute force) user credentials and
gain unauthorized access.
Brute Force Protection may be enabled for the listed services. Once protection is enabled, three or more failed connection
attempts within 60 seconds from a specific source IP trigger it to be banned from connecting for the next 60 seconds. Active
Bans are also listed and may be refreshed by reloading the page.
Note:
When a Tripp Lite device is running on an untrusted network, it is recommended that a variety of strategies be used to lock down
remote access. This includes strong passwords (or even better, SSH public key authentication), VPN, and using Firewall Rules to whitelist
remote access from trusted source networks only. Refer to the Knowledge Base for details.
3. System Configuration