2017-11-29 06:52:03 +01:00
|
|
|
[ssh]
|
|
|
|
|
enabled = true
|
2017-11-29 07:02:20 +01:00
|
|
|
port = 22
|
2017-11-29 06:52:03 +01:00
|
|
|
protocol = ssh
|
|
|
|
|
filter = sshd
|
|
|
|
|
logpath = /var/log/auth.log
|
|
|
|
|
action = iptables-allports[name=sshd, protocol=all]
|
2020-08-07 18:50:52 +02:00
|
|
|
maxretry = 6
|
|
|
|
|
findtime = 60
|
2017-11-29 06:52:03 +01:00
|
|
|
bantime = 86400
|
|
|
|
|
|
2018-07-12 01:47:06 +02:00
|
|
|
[freeswitch]
|
2022-08-03 01:38:37 +02:00
|
|
|
enabled = false
|
2018-04-17 21:56:01 +02:00
|
|
|
port = 5060:5091
|
2016-05-28 20:09:45 +02:00
|
|
|
protocol = all
|
2016-04-29 21:24:22 +02:00
|
|
|
filter = freeswitch
|
|
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
2018-08-11 23:22:30 +02:00
|
|
|
#logpath = /usr/local/freeswitch/log/freeswitch.log
|
2018-07-12 03:25:55 +02:00
|
|
|
action = iptables-allports[name=freeswitch, protocol=all]
|
2020-08-07 18:50:52 +02:00
|
|
|
maxretry = 10
|
|
|
|
|
findtime = 60
|
2017-11-29 06:52:03 +01:00
|
|
|
bantime = 3600
|
2016-04-29 21:24:22 +02:00
|
|
|
# sendmail-whois[name=FreeSwitch, dest=root, sender=fail2ban@example.org] #no smtp server installed
|
|
|
|
|
|
2021-02-04 01:45:23 +01:00
|
|
|
[freeswitch-acl]
|
2022-08-03 01:38:37 +02:00
|
|
|
enabled = false
|
2021-02-04 01:45:23 +01:00
|
|
|
port = 5060:5091
|
|
|
|
|
protocol = all
|
|
|
|
|
filter = freeswitch-acl
|
|
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
|
|
|
|
#logpath = /usr/local/freeswitch/log/freeswitch.log
|
|
|
|
|
action = iptables-allports[name=freeswitch-acl, protocol=all]
|
|
|
|
|
maxretry = 900
|
|
|
|
|
findtime = 60
|
|
|
|
|
bantime = 86400
|
|
|
|
|
|
2018-07-12 01:47:06 +02:00
|
|
|
[freeswitch-ip]
|
2017-06-07 07:15:08 +02:00
|
|
|
enabled = false
|
2018-04-17 21:56:01 +02:00
|
|
|
port = 5060:5091
|
2017-06-07 07:15:08 +02:00
|
|
|
protocol = all
|
|
|
|
|
filter = freeswitch-ip
|
|
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
2018-08-11 23:22:30 +02:00
|
|
|
#logpath = /usr/local/freeswitch/log/freeswitch.log
|
2018-07-12 03:25:55 +02:00
|
|
|
action = iptables-allports[name=freeswitch-ip, protocol=all]
|
2017-06-07 07:15:08 +02:00
|
|
|
maxretry = 1
|
2020-08-07 18:50:52 +02:00
|
|
|
findtime = 60
|
2017-06-07 07:15:08 +02:00
|
|
|
bantime = 86400
|
2016-05-04 22:23:17 +02:00
|
|
|
|
2018-07-12 01:59:55 +02:00
|
|
|
[auth-challenge-ip]
|
2018-07-12 01:35:22 +02:00
|
|
|
enabled = false
|
2018-07-12 01:34:57 +02:00
|
|
|
port = 5060:5091
|
|
|
|
|
protocol = all
|
2018-07-12 02:14:57 +02:00
|
|
|
filter = auth-challenge-ip
|
2018-07-12 01:34:57 +02:00
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
2018-08-11 23:22:30 +02:00
|
|
|
#logpath = /usr/local/freeswitch/log/freeswitch.log
|
2018-07-12 03:25:55 +02:00
|
|
|
action = iptables-allports[name=auth-challenge-ip, protocol=all]
|
2018-07-12 01:34:57 +02:00
|
|
|
maxretry = 1
|
2020-08-07 18:50:52 +02:00
|
|
|
findtime = 60
|
2018-07-12 01:34:57 +02:00
|
|
|
bantime = 86400
|
|
|
|
|
|
2018-07-12 01:43:07 +02:00
|
|
|
[sip-auth-challenge]
|
2019-11-28 01:04:40 +01:00
|
|
|
enabled = false
|
2018-04-17 21:56:01 +02:00
|
|
|
port = 5060:5091
|
2016-05-28 20:09:45 +02:00
|
|
|
protocol = all
|
2018-07-12 01:43:07 +02:00
|
|
|
filter = sip-auth-challenge
|
2016-05-28 20:09:45 +02:00
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
2018-08-11 23:22:30 +02:00
|
|
|
#logpath = /usr/local/freeswitch/log/freeswitch.log
|
2018-07-12 03:25:55 +02:00
|
|
|
action = iptables-allports[name=sip-auth-challenge, protocol=all]
|
2020-08-07 18:50:52 +02:00
|
|
|
maxretry = 100
|
|
|
|
|
findtime = 60
|
2018-05-02 21:26:22 +02:00
|
|
|
bantime = 7200
|
|
|
|
|
|
2018-07-12 01:43:07 +02:00
|
|
|
[sip-auth-failure]
|
2022-08-03 01:38:37 +02:00
|
|
|
enabled = false
|
2018-05-02 21:26:22 +02:00
|
|
|
port = 5060:5091
|
|
|
|
|
protocol = all
|
2018-07-12 01:43:07 +02:00
|
|
|
filter = sip-auth-failure
|
2018-05-02 21:26:22 +02:00
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
2018-08-11 23:22:30 +02:00
|
|
|
#logpath = /usr/local/freeswitch/log/freeswitch.log
|
2018-07-12 03:25:55 +02:00
|
|
|
action = iptables-allports[name=sip-auth-failure, protocol=all]
|
2020-08-07 18:50:52 +02:00
|
|
|
maxretry = 6
|
|
|
|
|
findtime = 60
|
2017-11-29 06:52:03 +01:00
|
|
|
bantime = 7200
|
2016-04-29 21:24:22 +02:00
|
|
|
|
2018-01-21 04:11:13 +01:00
|
|
|
[fusionpbx-404]
|
2020-02-20 00:41:55 +01:00
|
|
|
enabled = false
|
2018-04-17 21:56:01 +02:00
|
|
|
port = 5060:5091
|
2016-11-26 05:27:24 +01:00
|
|
|
protocol = all
|
2018-01-21 04:11:13 +01:00
|
|
|
filter = fusionpbx-404
|
2016-11-26 06:00:58 +01:00
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
2018-08-11 23:22:30 +02:00
|
|
|
#logpath = /usr/local/freeswitch/log/freeswitch.log
|
2018-01-21 04:11:13 +01:00
|
|
|
action = iptables-allports[name=fusionpbx-404, protocol=all]
|
2020-08-07 18:50:52 +02:00
|
|
|
maxretry = 6
|
|
|
|
|
findtime = 60
|
2016-11-26 05:27:24 +01:00
|
|
|
bantime = 86400
|
2016-11-26 02:16:08 +01:00
|
|
|
|
2016-04-29 21:24:22 +02:00
|
|
|
[fusionpbx]
|
|
|
|
|
enabled = true
|
|
|
|
|
port = 80,443
|
|
|
|
|
protocol = tcp
|
|
|
|
|
filter = fusionpbx
|
|
|
|
|
logpath = /var/log/auth.log
|
2018-07-12 03:25:55 +02:00
|
|
|
action = iptables-allports[name=fusionpbx, protocol=all]
|
2016-04-29 21:24:22 +02:00
|
|
|
# sendmail-whois[name=fusionpbx, dest=root, sender=fail2ban@example.org] #no smtp server installed
|
2020-08-07 18:50:52 +02:00
|
|
|
maxretry = 20
|
|
|
|
|
findtime = 60
|
2017-11-29 06:52:03 +01:00
|
|
|
bantime = 3600
|
2016-05-05 00:58:38 +02:00
|
|
|
|
2017-10-09 07:58:24 +02:00
|
|
|
[fusionpbx-mac]
|
2017-10-09 06:29:31 +02:00
|
|
|
enabled = true
|
|
|
|
|
port = 80,443
|
|
|
|
|
protocol = tcp
|
2017-10-09 19:33:17 +02:00
|
|
|
filter = fusionpbx-mac
|
2017-10-09 07:24:23 +02:00
|
|
|
logpath = /var/log/syslog
|
2018-07-12 03:25:55 +02:00
|
|
|
action = iptables-allports[name=fusionpbx-mac, protocol=all]
|
2017-10-09 07:58:24 +02:00
|
|
|
# sendmail-whois[name=fusionpbx-mac, dest=root, sender=fail2ban@example.org] #no smtp server installed
|
2020-08-07 18:50:52 +02:00
|
|
|
maxretry = 10
|
|
|
|
|
findtime = 60
|
2018-10-11 20:22:35 +02:00
|
|
|
bantime = 86400
|
2017-10-09 06:29:31 +02:00
|
|
|
|
2016-05-05 00:58:38 +02:00
|
|
|
[nginx-404]
|
2016-05-28 20:09:45 +02:00
|
|
|
enabled = true
|
|
|
|
|
port = 80,443
|
|
|
|
|
protocol = tcp
|
|
|
|
|
filter = nginx-404
|
|
|
|
|
logpath = /var/log/nginx/access*.log
|
2018-07-12 03:25:55 +02:00
|
|
|
action = iptables-allports[name=nginx-404, protocol=all]
|
2017-11-29 06:52:03 +01:00
|
|
|
bantime = 3600
|
2020-08-07 18:50:52 +02:00
|
|
|
findtime = 60
|
|
|
|
|
maxretry = 300
|
2016-05-05 00:58:38 +02:00
|
|
|
|
|
|
|
|
[nginx-dos]
|
|
|
|
|
# Based on apache-badbots but a simple IP check (any IP requesting more than
|
2018-10-11 20:25:37 +02:00
|
|
|
# 300 pages in 60 seconds, or 5p/s average, is suspicious)
|
|
|
|
|
enabled = true
|
2016-08-23 18:16:15 +02:00
|
|
|
port = 80,443
|
2016-05-28 20:09:45 +02:00
|
|
|
protocol = tcp
|
|
|
|
|
filter = nginx-dos
|
|
|
|
|
logpath = /var/log/nginx/access*.log
|
2018-07-12 03:25:55 +02:00
|
|
|
action = iptables-allports[name=nginx-dos, protocol=all]
|
2020-08-07 18:50:52 +02:00
|
|
|
findtime = 60
|
2018-10-11 20:22:35 +02:00
|
|
|
bantime = 86400
|
2020-08-07 18:50:52 +02:00
|
|
|
maxretry = 800
|