- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
When you put in place remote access (VPN) and you validate the username/password against an internal directory (like Active Directory), how do you prevent a malicious user from locking user accounts from the outside?
If a malicious user tries different passwords for a username either on the SSL VPN webpage or by using the endpoint VPN client, eventually the account will be locked/disabled in the internal directory.
We can then imagine someone doing a DoS attack for all the users in the organization.
Thanks!
P.S. I'm interested in a solution for a setup running R80.10
You have experienced that live, did test the issue in lab or is this just a theoretical question ?
All of the above.
Why do you ask?
Hi,
Could you please provide solution of sk92383 to study. I don't have advanced access.
Remote Access clients can connect to VPN Gateway only once
Regards
Rajendra
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY