<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Access VPN limit logins r80.30 in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-limit-logins-r80-30/m-p/132440#M7782</link>
    <description>&lt;P&gt;Yes if failed atttemp with wrong usernamne+password for 3 times lock the account until an administrator can unlock manually or lock for X period of time to avoid bruteforcing.&lt;/P&gt;</description>
    <pubDate>Fri, 22 Oct 2021 15:03:57 GMT</pubDate>
    <dc:creator>K_montalvo</dc:creator>
    <dc:date>2021-10-22T15:03:57Z</dc:date>
    <item>
      <title>Remote Access VPN limit logins r80.30</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-limit-logins-r80-30/m-p/132432#M7780</link>
      <description>&lt;P&gt;Hello Friends,&lt;/P&gt;&lt;P&gt;Is there's a possibility to set the&amp;nbsp; Remote Access VPN login attempts and block duration?&lt;/P&gt;&lt;P&gt;I'm using local VPN users, soon will be transitioning to LDAP&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Oct 2021 13:30:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-limit-logins-r80-30/m-p/132432#M7780</guid>
      <dc:creator>K_montalvo</dc:creator>
      <dc:date>2021-10-22T13:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN limit logins r80.30</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-limit-logins-r80-30/m-p/132437#M7781</link>
      <description>&lt;P&gt;Are you trying to configure something like “if X attempts to login are made, prevent access for Y minutes”?&lt;BR /&gt;I don’t believe this is something you can configure for internally defined users.&lt;BR /&gt;An external authentication source should allow this, though.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Oct 2021 14:32:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-limit-logins-r80-30/m-p/132437#M7781</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-10-22T14:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN limit logins r80.30</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-limit-logins-r80-30/m-p/132440#M7782</link>
      <description>&lt;P&gt;Yes if failed atttemp with wrong usernamne+password for 3 times lock the account until an administrator can unlock manually or lock for X period of time to avoid bruteforcing.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Oct 2021 15:03:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-limit-logins-r80-30/m-p/132440#M7782</guid>
      <dc:creator>K_montalvo</dc:creator>
      <dc:date>2021-10-22T15:03:57Z</dc:date>
    </item>
  </channel>
</rss>

