Such features, which have been implemented across all versions of Cisco ASA and FTD this month, ensure protection against continuous failed remote access VPN service authentication attempts, client initiation attacks, and attempted compromise of invalid remote access VPN services, according to Cisco, which noted the need to input certain commands to activate the newly added capabilities while indicating a possible effect on device performance. “There is no expected “downside,”
Source: SC Magazine