Brute force on HTTP login protection

bogdan81d
Posts: 5
Freshman Member


Hi guys, I have a ZyXEL GS2210-8 and I'm finding some logs, that are have 1s apart from each line, with a NO authentication HTTP(s) message. Unfortunately the log doesn't show any source IP addresses (that would be perfect) so I'm trying to find a way to protect the switch. I have some a remote-management index, but I need a large group of internal IP addresses, and from one of them it comes this "attack". I can't restrict this list, I need it, I just want to know if there is some way to find out the IP address behind the attack, or if there is a way to stop the brute force attack.
Thanks.
BD
#Biz_Switch_June
#Biz_Switch_June
0
Categories
- All Categories
- 431 Beta Program
- 2.6K Nebula
- 164 Nebula Ideas
- 112 Nebula Status and Incidents
- 6K Security
- 364 USG FLEX H Series
- 292 Security Ideas
- 1.5K Switch
- 78 Switch Ideas
- 1.2K Wireless
- 42 Wireless Ideas
- 6.6K Consumer Product
- 262 Service & License
- 407 News and Release
- 87 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.9K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 83 Security Highlight