Brute force on HTTP login protection

bogdan81d
Posts: 4
Hi guys, I have a ZyXEL GS2210-8 and I'm finding some logs, that are have 1s apart from each line, with a NO authentication HTTP(s) message. Unfortunately the log doesn't show any source IP addresses (that would be perfect) so I'm trying to find a way to protect the switch. I have some a remote-management index, but I need a large group of internal IP addresses, and from one of them it comes this "attack". I can't restrict this list, I need it, I just want to know if there is some way to find out the IP address behind the attack, or if there is a way to stop the brute force attack.
Thanks.
BD
#Biz_Switch_June
#Biz_Switch_June
0
Categories
- 6.8K All Categories
- 1.3K Nebula
- 26 Nebula Ideas
- 28 Nebula Status and Incidents
- 3.8K Security
- 199 Security Ideas
- 690 Switch
- 24 Switch Ideas
- 564 WirelessLAN
- 8 WLAN Ideas
- 4.5K Consumer Product
- 95 Service & License
- 211 New and Release
- 34 Security Advisories
- 476 FAQ
- 216 Nebula FAQ
- 106 Security FAQ
- 72 Switch FAQ
- 66 WirelessLAN FAQ
- Documents
- 20 Nebula Monthly Express
- 40 About Community
- 30 Security Highlight