Information
Users who have been disconnected due to bad login attempts should be locked out for 30 minutes.
Rationale:
Remote administration protocols like Telnet and SSH are commonly targeted by Brute Force or Dictionary attacks where a malicious user attempts to guess a valid username/password combination in order to gain control of the router.
To slow down the rate at which an attacker can attempt to guess passwords accounts disconnected by the tries-before-disconnect option should be locked out for a period of 30 minutes.
Solution
Configure the time users should be locked out using the following command under the [edit system] hierarchy:
[edit system]
user@host#set login retry-options lockout-period 30
Default Value:
By default users who are disconnected for multiple failed login attempts are not locked out.