Update jail.local

This commit is contained in:
FusionPBX 2018-05-02 14:02:28 -06:00 committed by GitHub
parent 1389ff9066
commit 7ad7516c35
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 12 additions and 12 deletions

View File

@ -55,46 +55,46 @@ maxretry = 1
findtime = 30
bantime = 86400
[freeswitch-sip_auth_failure-udp]
[freeswitch-auth_failure-udp]
enabled = true
port = 5060:5091
protocol = all
filter = freeswitch-sip_auth_failure
filter = freeswitch-auth_failure
logpath = /var/log/freeswitch/freeswitch.log
action = iptables-multiport[name=freeswitch-sip_auth_failure-udp, port="5060:5090", protocol=udp]
action = iptables-multiport[name=freeswitch-auth_failure-udp, port="5060:5090", protocol=udp]
maxretry = 50
findtime = 30
bantime = 6000
[freeswitch-freeswitch-sip_auth_challenge-tcp]
[freeswitch-auth_failure-tcp]
enabled = true
port = 5060:5091
protocol = all
filter = freeswitch-sip_auth_failure
filter = freeswitch-auth_failure
logpath = /var/log/freeswitch/freeswitch.log
action = iptables-multiport[name=freeswitch-sip_auth_failure-tcp, port="5060:5090", protocol=tcp]
action = iptables-multiport[name=freeswitch-auth_failure-tcp, port="5060:5090", protocol=tcp]
maxretry = 10
findtime = 30
bantime = 7200
[freeswitch-freeswitch-sip_auth_challenge-udp]
[freeswitch-auth_challenge-udp]
enabled = true
port = 5060:5091
protocol = all
filter = freeswitch-sip_auth_challenge
filter = freeswitch-auth_challenge
logpath = /var/log/freeswitch/freeswitch.log
action = iptables-multiport[name=freeswitch-sip_auth_challenge-tcp, port="5060:5090", protocol=udp]
action = iptables-multiport[name=freeswitch-auth_challenge-tcp, port="5060:5090", protocol=udp]
maxretry = 50
findtime = 30
bantime = 7200
[freeswitch-sip_auth_challenge-tcp]
[freeswitch-auth_challenge-tcp]
enabled = true
port = 5060:5091
protocol = all
filter = freeswitch-sip_auth_challenge
filter = freeswitch-auth_challenge
logpath = /var/log/freeswitch/freeswitch.log
action = iptables-multiport[name=freeswitch-sip_auth_challenge-tcp, port="5060:5090", protocol=tcp]
action = iptables-multiport[name=freeswitch-auth_challenge-tcp, port="5060:5090", protocol=tcp]
maxretry = 50
findtime = 30
bantime = 7200