|
|
|
@ -22,13 +22,13 @@ after = nftables-common.local
|
|
|
|
|
# Notes.: additional expressions for nftables filter rule
|
|
|
|
|
# Values: nftables expressions
|
|
|
|
|
#
|
|
|
|
|
nftables_mode = <protocol> dport { <port> }
|
|
|
|
|
nftables_mode = <protocol> dport \{ <port> \}
|
|
|
|
|
|
|
|
|
|
# Option: actionstart
|
|
|
|
|
# Notes.: command executed once at the start of Fail2Ban.
|
|
|
|
|
# Values: CMD
|
|
|
|
|
#
|
|
|
|
|
actionstart = <nftables> add set filter f2b-<name> { type ipv4_addr\; }
|
|
|
|
|
actionstart = <nftables> add set filter f2b-<name> \{ type ipv4_addr\; \}
|
|
|
|
|
<nftables> insert rule filter <chain> %(nftables_mode)s ip saddr @f2b-<name> <blocktype>
|
|
|
|
|
|
|
|
|
|
# Option: actionstop
|
|
|
|
@ -50,7 +50,7 @@ actioncheck = <nftables> list chain filter <chain> | grep -q '@f2b-<name>[ \t]'
|
|
|
|
|
# Tags: See jail.conf(5) man page
|
|
|
|
|
# Values: CMD
|
|
|
|
|
#
|
|
|
|
|
actionban = <nftables> add element filter f2b-<name> { <ip> }
|
|
|
|
|
actionban = <nftables> add element filter f2b-<name> \{ <ip> \}
|
|
|
|
|
|
|
|
|
|
# Option: actionunban
|
|
|
|
|
# Notes.: command executed when unbanning an IP. Take care that the
|
|
|
|
@ -58,7 +58,7 @@ actionban = <nftables> add element filter f2b-<name> { <ip> }
|
|
|
|
|
# Tags: See jail.conf(5) man page
|
|
|
|
|
# Values: CMD
|
|
|
|
|
#
|
|
|
|
|
actionunban = <nftables> delete element filter f2b-<name> { <ip> }
|
|
|
|
|
actionunban = <nftables> delete element filter f2b-<name> \{ <ip> \}
|
|
|
|
|
|
|
|
|
|
[Init]
|
|
|
|
|
|
|
|
|
|