Skip to content

Instantly share code, notes, and snippets.

@parrazam
Created June 4, 2020 15:01
Show Gist options
  • Save parrazam/319262a7455ef955d2d341598d810f1c to your computer and use it in GitHub Desktop.
Save parrazam/319262a7455ef955d2d341598d810f1c to your computer and use it in GitHub Desktop.
Fail2Ban jail local
[sshd]
# To use more aggressive ssh modes set filter parameter "mode":
# normal (default), ddos, extra or aggressive (combines all).
# See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
#mode = normal
port = ssh
enabled = true
filter = sshd
ignoreip = 192.168.1.0/24
banaction = iptables-multiport
bantime = 3600
maxretry = 3
logpath = %(sshd_log)s
backend = %(sshd_backend)s
action = sendnotif
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment