Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

Can SonicWall firewalls prevent brute force attacks?

10/14/2021 122 People found this article helpful 199,380 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    This article describes how to protect the firewall and the network behind it from bruteforce or dictionary attacks.

    A brute force attack is a method used to obtain information such as a user password or personal identification number (PIN) by trying thousands of combinations. In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.

    A dictionary attack is a method of using a dictionary in order to get access to a computer or server by systematically entering every word in a dictionary as a password. It can also be used to decrypt encrypted messages by guessing the key.

    The Intrusion Prevention System (IPS) available in the SonicWall, if enabled on the WAN zone, should prevent most of the exploits, web attacks, SQL injections and database attacks. In order to prevent them, the SonicWall will match the traffic pattern against the IPS signatures and if it matches the traffic will be blocked.

    NOTE: IPS must be licensed and the signatures must be up-to-date.

    Some bruteforce attacks are not easy to detect as they look like normal attempts to login.

    Resolution

    Resolution for SonicOS 7.X

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.

    • Make sure IPS is licensed and enabled from POLICY | Security Services | Intrusion Prevention and on the WAN zone from OBJECT | Match Objects | Zones. You will need to make sure that the database is correctly downloaded and there's nothing blocking the updates.Image

    • Ensure that IPS is preventing (blocking) med/high attacks.
      Image

       NOTE: DPI-SSL should also be licensed and configured so attacks via HTTPS/SSH can be easily detected:
    • Enabling Geo-IP and Botnet Filter security services can also help prevent brute force attacks.
    • Enable TCP, UDP, ICMP Flood Protection on NETWORK | Firewall | Flood Protection.
    • If you wish to have access to the WAN Interface via SSH or HTTPS, you may create an access rule (POLICY | Rules and Policies | Access Rules) from WAN to WAN denying all traffic but the HTTPS/SSH traffic from specific Public IPs of your
    • On DEVICE | Settings | Administration
      • enable Enable Administrator/user lockout.
      • enable Password must be changed every (days).
      • enable Bar repeated passwords for this many changes.
      • Set the Enforce password complexity: to Require alphabetic, numeric and symbolic characters and set the complexity requirements.
      • Change the default HTTPS and SSH Ports for management 443 to a custom one.Image

        Image

         CAUTION: Be very careful about enabling the "administrator/user lockout"! Some bruteforce attacks are actually DoS, attackers are just trying to lockout a huge number of your most important users so that your network will be down.

    • Use VPNs (SSLVPN or IPSec VPN) to secure access to internal servers should you need RDP or get access to them.You shouldn't open ports like RDP - 3389 to the whole world using a NAT Policy unless you're filtering the access via access rules to only known Public IPs.
    • Do not use the option Use default key for simple client provisioning or Cache XAUTH User Name and Password on Client: on the VPN | Settings and use Strong Encryption Methods.
    • Enable the 2 Factors Authentication for external connecting users (i.e. SSLVPN or GVC users): when creating Local Users from Users | Local Users, enable the option Require one-time passwords or enable it on your LDAP/Radius Servers.
    • Bruteforce/Dictionary attacks via SSLVPN can be blocked by using a SonicWall SRA appliance: How to block Brute Force and Dictionary attacks with SRA.

     CAUTION: Accomplishing the best protection for your network against bruteforce and dictionary attacks would require the upstream ISP or services like CloudFlare, Incapsula, etc. to drop the traffic once a bruteforce attack against your network is detected.



    Resolution for SonicOS 6.5

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.


    • Make sure IPS is licensed and enabled from Manage | Security Services | Intrusion Prevention and on the WAN zone from Manage | Network | Zones. You will need to make sure that the database is correctly downloaded and there's nothing blocking the updates.
      Image

    • Ensure that IPS is preventing (blocking) med/high attacks.
      Image

       NOTE: DPI-SSL should also be licensed and configured so attacks via HTTPS/SSH can be easily detected:

    • Enabling Geo-IP and Botnet Filter security services can also help prevent brute force attacks.
    • Enable TCP, UDP, ICMP Flood Protection on Manage | Firewall Settings | Flood Protection.
    • If you wish to have access to the WAN Interface via SSH or HTTPS, you may create an access rule (Manage | Rules | Access Rules) from WAN to WAN denying all traffic but the HTTPS/SSH traffic from specific Public IPs of your company.
    • On Manage | Appliance | Base Settings
      • enable Enable administrator/user lockout.
      • enable Password must be changed every (days).
      • enable Bar repeated passwords for this many changes.
      • Set the Enforce password complexity: to Require alphabetic, numeric and symbolic characters and set the complexity requirements.
      • Change the default HTTPS and SSH Ports for management 443 to a custom one.
        Image

         CAUTION: Be very careful about enabling the administrator/user lockout! Some bruteforce attacks are actually DoS, attackers are just trying to lockout a huge number of your most important users so that your network will be down.

    • Use VPNs (SSLVPN or IPSec VPN) to secure access to internal servers should you need RDP or get access to them.You shouldn't open ports like RDP - 3389 to the whole world using a NAT Policy unless you're filtering the access via access rules to only known Public IPs.
    • Do not use the option Use default key for simple client provisioning or Cache XAUTH User Name and Password on Client: on the Manage | VPN | Base Settings and use Strong Encryption Methods.
    • Enable the 2 Factors Authentication for external connecting users (i.e. SSLVPN or GVC users): when creating Local Users from Manage | Users | Local Users & Groups, enable the option Require one-time passwords or enable it on your LDAP/Radius Servers.
    • Bruteforce/Dictionary attacks via SSLVPN can be blocked by using a SonicWall SRA appliance: How to block Brute Force and Dictionary attacks with SRA

     CAUTION: Accomplishing the best protection for your network against bruteforce and dictionary attacks would require the upstream ISP or services like CloudFlare, Incapsula, etc. to drop the traffic once a bruteforce attack against your network is detected.



    Resolution for SonicOS 6.2 and Below

    The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.


    • Make sure IPS is licensed and enabled from Security Services | IPS and on the WAN zone from Network | Zones. You will need to make sure that the database is correctly downloaded and there's nothing blocking the updates.
      Image

    • Ensure that IPS is preventing (blocking) all med/high attacks.
      Image

      NOTE: DPI-SSL should also be licensed and configured so attacks via HTTPS/SSH can be easily detected:

    • Geo-IP and Botnet Filter can also help on this fight.
    • Enable TCP, UDP, ICMP Flood Protection on Firewall Settings | Flood Protection.
    • If you wish to have access to the WAN Interface via SSH or HTTPS, you may create an access rule (Firewall | Access Rules) from WAN to WAN denying all traffic but the HTTPS/SSH traffic from specific Public IPs of your company.
    • On System | Administration
      • enable Enable administrator/user lockout.
      • enable Password must be changed every (days).
      • enable Bar repeated passwords for this many changes.
      • Set the Enforce password complexity: to Require alphabetic, numeric and symbolic characters and set the complexity requirements.
      • Change the default HTTPS and SSH Ports for management 443 to a custom one.
        Image

        CAUTION: Be very careful about enabling the "administrator/user lockout"! Some bruteforce attacks are actually DoS, attackers are just trying to lockout a huge number of your most important users so that your network will be down.

    • Use VPNs (SSLVPN or IPSec VPN) to secure access to internal servers should you need RDP or get access to them.You shouldn't open ports like RDP - 3389 to the whole world using a NAT Policy unless you're filtering the access via access rules to only known Public IPs.
    • Do not use the option Use default key for simple client provisioning or Cache XAUTH User Name and Password on Client: on the VPN | Settings and use Strong Encryption Methods.
    • Enable the 2 Factors Authentication for external connecting users (i.e. SSLVPN or GVC users): when creating Local Users from Users | Local Users, enable the option Require one-time passwords or enable it on your LDAP/Radius Servers.
    • Bruteforce/Dictionary attacks via SSLVPN can be blocked by using a SonicWall SRA appliance: How to block Brute Force and Dictionary attacks with SRA.

    CAUTION: Accomplishing the best protection for your network against bruteforce and dictionary attacks would require the upstream ISP or services like CloudFlare, Incapsula, etc. to drop the traffic once a bruteforce attack against your network is detected.

    Related Articles

    • How to Setup the SonicWave 600 series
    • Identical Access Rules for different users/user groups
    • Advanced Network Security eLearning Training Course

    Categories

    • Firewalls > TZ Series > Geo-IP & Botnet Filter
    • Firewalls > NSa Series > Geo-IP & Botnet Filter
    • Firewalls > TZ Series > IPS/GAV/Spyware
    • Firewalls > NSa Series > IPS/GAV/Spyware

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2023 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top