Skip to content

Mideye Shield Configuration – Automated Brute Force Protection and IP Blocking

The Mideye Shield Configuration page controls MideyeServer’s automated threat protection system. Mideye Shield evaluates the fraud score of incoming authentication requests based on IP reputation data and can automatically block suspicious requests, send webhook notifications to external systems, and log high-risk events.

The shield operates on a threshold-based model: each action (block, webhook, log) triggers when the fraud score of an incoming request meets or exceeds its configured threshold. Lower thresholds capture more events (higher sensitivity), while higher thresholds only flag the most suspicious traffic.

Configure Mideye Shield to protect your RADIUS infrastructure from brute force attacks, credential stuffing, and other automated threats — while maintaining visibility through webhook integrations and logging.

Required Role: ROOT, SUPER_ADMIN, or ADMIN (to modify settings)

Navigation: Home → Mideye Shield → Configuration

RoleView ConfigurationModify Configuration
ROOT
SUPER_ADMIN
ADMIN
OPERATOR

The Enabled checkbox controls the master toggle for the entire Mideye Shield system. When disabled, no fraud score evaluation, automatic blocking, webhook notifications, or shield logging occurs. All action-specific fields become disabled when the master toggle is off.

The Block Response dropdown determines how MideyeServer handles blocked requests:

Response TypeDescription
REJECT_REQUESTSend a RADIUS Access-Reject response to the NAS. The client receives an explicit denial.
DISCARD_REQUESTSilently drop the request without responding. The client experiences a timeout.

Enable the Block Action Enabled checkbox to automatically block authentication requests from IP addresses with a high fraud score.

FieldTypeRangeDefaultDescription
Block ThresholdNumber0–10070Fraud score at or above which requests are blocked
Block Expiration HoursNumber1–16824Duration (hours) that an IP remains blocked

When an IP is blocked, all subsequent authentication requests from that IP are immediately rejected (or discarded) for the configured expiration period without performing authentication. Blocked IPs are visible on the Auto-blocked IPs page.

Enable the Webhook Action Enabled checkbox to send HTTP webhook notifications when high-risk authentication attempts are detected.

FieldTypeValidationDefaultDescription
Webhook ThresholdNumber0–100, required60Fraud score at or above which the webhook is triggered
Webhook URLURLValid URL, required when enabledHTTP endpoint to receive webhook notifications
Webhook Data TemplateTextRequired when enabled{"text": "%s"}JSON template for the webhook payload. Use %s as a placeholder for the event data.

Webhook payload: The template is sent as the HTTP request body with the %s placeholder replaced by the event details. Configure the template to match the expected format of your receiving system (e.g., Slack, Microsoft Teams, or a custom SIEM endpoint).

Enable the Log Action Enabled checkbox to write log entries for authentication attempts with elevated fraud scores.

FieldTypeRangeDefaultDescription
Log ThresholdNumber0–10050Fraud score at or above which log entries are created

Log entries are written to the MideyeServer system log and can be viewed on the Log Files page.

The Block By Default setting controls the default behavior of the static filter rule engine. This setting is part of the Mideye Shield configuration but is managed on the Static Filter Rules page.

Field NameTypeRequiredDefaultValidationDescription
enabledBooleanYesfalseMaster toggle for Mideye Shield
blockActionEnabledBooleanYestrueEnable automatic IP blocking
blockThresholdNumberYes700–100Fraud score threshold for blocking
blockExpirationHoursNumberYes241–168Block duration in hours
blockResponseEnumYesREJECT_REQUESTREJECT_REQUEST or DISCARD_REQUESTHow blocked requests are handled
webhookActionEnabledBooleanYesfalseEnable webhook notifications
webhookThresholdNumberYes600–100Fraud score threshold for webhooks
webhookUrlStringConditionalValid URL, required when webhook enabledWebhook endpoint URL
webhookDataTemplateStringConditional{"text": "%s"}Required when webhook enabledJSON template for webhook payload
logActionEnabledBooleanYestrueEnable shield logging
logThresholdNumberYes500–100Fraud score threshold for logging
staticFilterBlockByDefaultBooleanYesfalseDefault block behavior for static filter rules

Purpose: Persist changes to the Mideye Shield configuration. Steps:

  1. Modify the desired settings.
  2. Click the Save button.

Result: The configuration is saved and takes effect immediately. A success notification is displayed.

  1. Enable Mideye Shield (check the Enabled checkbox).
  2. Enable the Block Action with the default threshold of 70.
  3. Set the Block Expiration to 24 hours.
  4. Select REJECT_REQUEST as the Block Response.
  5. Enable the Log Action with a threshold of 50 for visibility.
  6. Click Save.
  1. Enable the Webhook Action.
  2. Set the Webhook Threshold to the desired sensitivity level.
  3. Enter the webhook endpoint URL (e.g., a Slack incoming webhook or SIEM collector).
  4. Configure the Webhook Data Template to match the expected payload format.
  5. Click Save and test by monitoring webhook deliveries.

When MideyeServer operates in air-gapped mode (no internet access), Mideye Shield’s IP reputation scoring is unavailable because it requires external API connectivity. In this mode:

  • The Auto-blocked IPs page is disabled.
  • Static filter rules continue to function independently.
  • Consider relying on static filter rules for protection in air-gapped deployments.
IssuePossible CauseResolution
Shield not blocking any IPsShield not enabledVerify the Enabled checkbox is checked
Shield not blocking any IPsBlock threshold too highLower the block threshold value
Webhook not firingWebhook URL unreachableVerify network connectivity from MideyeServer to the webhook endpoint
Webhook not firingWebhook threshold too highLower the webhook threshold
Threshold fields disabledParent action checkbox uncheckedEnable the corresponding action checkbox
All fields disabledMaster toggle disabledCheck the Enabled checkbox
Save button shows errorValidation failureCheck that all required fields have valid values within the allowed ranges
  • Auto-blocked IPs — View and manage IP addresses automatically blocked by Mideye Shield
  • Static Filter Rules — Create manual rules to block or allow specific usernames and IP addresses
  • Blocked Attempts — View authentication attempts blocked by Mideye Shield or static rules
  • Authentication Logs — Review fraud scores in authentication event details