fusionpbx-install.sh/freebsd/resources/fail2ban/jail.local

123 lines
2.8 KiB
Plaintext
Raw Normal View History

2017-03-25 19:39:05 +01:00
[freeswitch-udp]
enabled = true
port = 5060,5061,5080,5081
protocol = all
filter = freeswitch
2017-04-03 06:29:24 +02:00
#logpath = /var/log/freeswitch/freeswitch.log
logpath = /usr/local/freeswitch/log/freeswitch.log
2017-03-25 19:39:05 +01:00
maxretry = 5
findtime = 600
2017-04-03 06:44:45 +02:00
banaction = pf
2017-03-25 19:39:05 +01:00
bantime = 600
# sendmail-whois[name=FreeSwitch, dest=root, sender=fail2ban@example.org] #no smtp server installed
[freeswitch-tcp]
enabled = true
port = 5060,5061,5080,5081
protocol = all
filter = freeswitch
2017-04-03 06:29:24 +02:00
#logpath = /var/log/freeswitch/freeswitch.log
logpath = /usr/local/freeswitch/log/freeswitch.log
2017-03-25 19:39:05 +01:00
maxretry = 5
findtime = 600
2017-04-03 06:44:45 +02:00
banaction = pf
2017-03-25 19:39:05 +01:00
bantime = 600
# sendmail-whois[name=FreeSwitch, dest=root, sender=fail2ban@example.org] #no smtp server installed
#[freeswitch-ip-tcp]
#enabled = true
#port = 5060,5061,5080,5081
#protocol = all
#filter = freeswitch-ip
#logpath = /var/log/freeswitch/freeswitch.log
2017-04-03 06:29:24 +02:00
logpath = /usr/local/freeswitch/log/freeswitch.log
2017-03-25 19:39:05 +01:00
#maxretry = 1
#findtime = 30
2017-04-03 06:44:45 +02:00
#banaction = pf
2017-03-25 19:39:05 +01:00
#bantime = 86400
#[freeswitch-ip-udp]
#enabled = true
#port = 5060,5061,5080,5081
#protocol = all
#filter = freeswitch-ip
#logpath = /var/log/freeswitch/freeswitch.log
2017-04-03 06:29:24 +02:00
logpath = /usr/local/freeswitch/log/freeswitch.log
2017-03-25 19:39:05 +01:00
#maxretry = 1
#findtime = 30
2017-04-03 06:44:45 +02:00
#banaction = pf
2017-03-25 19:39:05 +01:00
#bantime = 86400
[freeswitch-dos-udp]
enabled = true
port = 5060,5061,5080,5081
protocol = all
filter = freeswitch-dos
2017-04-03 06:29:24 +02:00
#logpath = /var/log/freeswitch/freeswitch.log
logpath = /usr/local/freeswitch/log/freeswitch.log
2017-03-25 19:39:05 +01:00
maxretry = 50
findtime = 30
2017-04-03 06:44:45 +02:00
banaction = pf
2017-03-25 19:39:05 +01:00
bantime = 6000
[freeswitch-dos-tcp]
enabled = true
port = 5060,5061,5080,5081
protocol = all
filter = freeswitch-dos
2017-04-03 06:29:24 +02:00
#logpath = /var/log/freeswitch/freeswitch.log
logpath = /usr/local/freeswitch/log/freeswitch.log
2017-03-25 19:39:05 +01:00
maxretry = 50
findtime = 30
2017-04-03 06:44:45 +02:00
banaction = pf
2017-03-25 19:39:05 +01:00
bantime = 6000
[freeswitch-404]
enabled = true
port = 5060,5061,5080,5081
protocol = all
filter = freeswitch-404
2017-04-03 06:29:24 +02:00
#logpath = /var/log/freeswitch/freeswitch.log
logpath = /usr/local/freeswitch/log/freeswitch.log
2017-03-25 19:39:05 +01:00
maxretry = 3
findtime = 300
2017-04-03 06:44:45 +02:00
banaction = pf
2017-03-25 19:39:05 +01:00
bantime = 86400
[fusionpbx]
enabled = true
port = 80,443
protocol = tcp
filter = fusionpbx
logpath = /var/log/auth.log
# sendmail-whois[name=fusionpbx, dest=root, sender=fail2ban@example.org] #no smtp server installed
maxretry = 10
findtime = 600
2017-04-03 06:44:45 +02:00
banaction = pf
2017-03-25 19:39:05 +01:00
bantime = 600
[nginx-404]
enabled = true
port = 80,443
protocol = tcp
filter = nginx-404
logpath = /var/log/nginx/access*.log
2017-04-03 06:44:45 +02:00
banaction = pf
2017-03-25 19:39:05 +01:00
bantime = 600
findtime = 60
maxretry = 120
[nginx-dos]
# Based on apache-badbots but a simple IP check (any IP requesting more than
# 240 pages in 60 seconds, or 4p/s average, is suspicious)
# Block for two full days.
enabled = true
port = 80,443
protocol = tcp
filter = nginx-dos
logpath = /var/log/nginx/access*.log
findtime = 60
2017-04-03 06:44:45 +02:00
banaction = pf
2017-03-25 19:39:05 +01:00
bantime = 172800
maxretry = 240