Information
The number of retries before the SSH login session disconnects.
This limits the number of times an unauthorized user can attempt a password without having to establish a new SSH login attempt. This reduces the potential for success during online brute force attacks by limiting the number of login attempts per SSH connection.
Solution
Configure the SSH timeout: 3 or less
hostname(config)#ip ssh authentication-retries [<em>3</em>]
Impact:
Organizations should implement a security policy limiting the number of authentication attempts for network administrators and enforce the policy through the 'ip ssh authentication-retries' command.