Brute force on HTTP login protection

bogdan81d
Posts: 5
Freshman Member


Hi guys, I have a ZyXEL GS2210-8 and I'm finding some logs, that are have 1s apart from each line, with a NO authentication HTTP(s) message. Unfortunately the log doesn't show any source IP addresses (that would be perfect) so I'm trying to find a way to protect the switch. I have some a remote-management index, but I need a large group of internal IP addresses, and from one of them it comes this "attack". I can't restrict this list, I need it, I just want to know if there is some way to find out the IP address behind the attack, or if there is a way to stop the brute force attack.
Thanks.
BD
#Biz_Switch_June
#Biz_Switch_June
0
Categories
- All Categories
- 415 Beta Program
- 2.5K Nebula
- 155 Nebula Ideas
- 105 Nebula Status and Incidents
- 5.9K Security
- 320 USG FLEX H Series
- 286 Security Ideas
- 1.5K Switch
- 78 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.6K Consumer Product
- 257 Service & License
- 399 News and Release
- 86 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.8K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 87 About Community
- 78 Security Highlight