DrayTek UK Users' Community Forum
Help, Advice and Solutions from DrayTek Users
Brute force protection for Remote Dial-in VPN
- pharcyder
- Topic Author
- Offline
- Member
Less
More
- Posts: 165
- Thank you received: 1
11 Jan 2022 10:58 #100415
by pharcyder
Brute force protection for Remote Dial-in VPN was created by pharcyder
Hi all - happy new year.
I turned up logging on my 2865 to troubleshoot an issue and I happened to notice a lot of failed dial in VPN login attempts to the Vigor from the usual global crowd.
I'm aware the Vigor router itself is exempt from its Firewall rules so I was looking at the Brute Force settings in System Maintenance -> Management. I notice there is a setting under Brute Force Protection for "VPN Server". I enabled it and tried to log in to an L2TP account incorrectly multiple times to trigger the time out but it didn't work. Manual is no help whatsoever. It's such a shame you can't use the GeoBlock feature in the Firewall to Whitelist Countries.
Any ideas how the Brute Force Protection works for VPN connections?
I turned up logging on my 2865 to troubleshoot an issue and I happened to notice a lot of failed dial in VPN login attempts to the Vigor from the usual global crowd.
I'm aware the Vigor router itself is exempt from its Firewall rules so I was looking at the Brute Force settings in System Maintenance -> Management. I notice there is a setting under Brute Force Protection for "VPN Server". I enabled it and tried to log in to an L2TP account incorrectly multiple times to trigger the time out but it didn't work. Manual is no help whatsoever. It's such a shame you can't use the GeoBlock feature in the Firewall to Whitelist Countries.
Any ideas how the Brute Force Protection works for VPN connections?
Please Log in or Create an account to join the conversation.
- mbames
- Offline
- Member
Less
More
- Posts: 326
- Thank you received: 0
11 Jan 2022 15:21 #100416
by mbames
Replied by mbames on topic Re: Brute force protection for Remote Dial-in VPN
Please Log in or Create an account to join the conversation.
- pharcyder
- Topic Author
- Offline
- Member
Less
More
- Posts: 165
- Thank you received: 1
11 Jan 2022 15:34 #100417
by pharcyder
Replied by pharcyder on topic Re: Brute force protection for Remote Dial-in VPN
You're right - tucked away in the DDoS Blacklist/Whitelist settings you can switch to use Country Objects in the pull down. Perfect!
Brute Force Protection VPN Server setting I cannot get to work at all. With the trigger set to 3, after 4 incorrect auth attempts nothing happens
Brute Force Protection VPN Server setting I cannot get to work at all. With the trigger set to 3, after 4 incorrect auth attempts nothing happens
Please Log in or Create an account to join the conversation.
- mbames
- Offline
- Member
Less
More
- Posts: 326
- Thank you received: 0
11 Jan 2022 16:25 #100418
by mbames
Replied by mbames on topic Re: Brute force protection for Remote Dial-in VPN
Does it show anything in the logs? I have to confess that I've not actually tried it, but I have just enabled it.
Please Log in or Create an account to join the conversation.
- pharcyder
- Topic Author
- Offline
- Member
Less
More
- Posts: 165
- Thank you received: 1
11 Jan 2022 19:47 #100419
by pharcyder
Replied by pharcyder on topic Re: Brute force protection for Remote Dial-in VPN
It shows a CHAP authentication failure in the logs….but I think I’ve found a bug. It’s reporting the auth fail for the wrong VPN account. When I dial in to trigger the auth failure it tells me a L2L account has an auth fail, not the Dial-in one I’m trying …but the L2L account hasn’t failed as it’s still connected. So basically what I’m trying to say is according to the logs, the wrong VPN account is called out with an auth failure. I wonder if this has something to do with the Brute Force trap not springing.
Incidentally I’m having problems with the Country Block in the Defense Setup -> Whitelist/Blacklist setting. I tried Country Black Listing “Asia / Pacific” with the Prioritise Blacklist First setting enabled. This prevented my local network accessing the internet effectively knocking everything internal offline. Disabling it restored service. I don’t understand how this feature is supposed to work.
Incidentally I’m having problems with the Country Block in the Defense Setup -> Whitelist/Blacklist setting. I tried Country Black Listing “Asia / Pacific” with the Prioritise Blacklist First setting enabled. This prevented my local network accessing the internet effectively knocking everything internal offline. Disabling it restored service. I don’t understand how this feature is supposed to work.
Please Log in or Create an account to join the conversation.
- pharcyder
- Topic Author
- Offline
- Member
Less
More
- Posts: 165
- Thank you received: 1
12 Jan 2022 16:56 #100427
by pharcyder
Replied by pharcyder on topic Re: Brute force protection for Remote Dial-in VPN
I spent more time playing with this and have a better understanding of how it works now. For the benefit of other users, here's what I found:
So I've enabled the last 2 options and hope I never need to access a website or service in the APAC region
So I've enabled the last 2 options and hope I never need to access a website or service in the APAC region
Please Log in or Create an account to join the conversation.
Moderators: Chris, Sami
Copyright © 2024 DrayTek