mirror of https://github.com/fail2ban/fail2ban
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
101 lines
2.9 KiB
101 lines
2.9 KiB
# Fail2Ban configuration file |
|
# |
|
# Authors: Sergey G Brester (sebres), Daniel Black, Alexander Koeppe |
|
# |
|
# This is for ipset protocol 6 (and hopefully later) (ipset v6.14). |
|
# Use ipset -V to see the protocol and version. Version 4 should use |
|
# iptables-ipset-proto4.conf. |
|
# |
|
# This requires the program ipset which is normally in package called ipset. |
|
# |
|
# IPset was a feature introduced in the linux kernel 2.6.39 and 3.0.0 kernels. |
|
# |
|
# If you are running on an older kernel you make need to patch in external |
|
# modules. |
|
# |
|
|
|
[INCLUDES] |
|
|
|
before = iptables.conf |
|
|
|
[Definition] |
|
|
|
# Option: actionstart |
|
# Notes.: command executed on demand at the first ban (or at the start of Fail2Ban if actionstart_on_demand is set to false). |
|
# Values: CMD |
|
# |
|
actionstart = ipset -exist create <ipmset> <ipsettype> timeout <default-ipsettime> maxelem <maxelem> <familyopt> |
|
<_ipt_add_rules> |
|
|
|
# Option: actionflush |
|
# Notes.: command executed once to flush IPS, by shutdown (resp. by stop of the jail or this action) |
|
# Values: CMD |
|
# |
|
actionflush = ipset flush <ipmset> |
|
|
|
# Option: actionstop |
|
# Notes.: command executed at the stop of jail (or at the end of Fail2Ban) |
|
# Values: CMD |
|
# |
|
actionstop = <_ipt_del_rules> |
|
<actionflush> |
|
ipset destroy <ipmset> |
|
|
|
# Option: actionban |
|
# Notes.: command executed when banning an IP. Take care that the |
|
# command is executed with Fail2Ban user rights. |
|
# Tags: See jail.conf(5) man page |
|
# Values: CMD |
|
# |
|
actionban = ipset -exist add <ipmset> <ip> timeout <ipsettime> |
|
|
|
# actionprolong = %(actionban)s |
|
|
|
# Option: actionunban |
|
# Notes.: command executed when unbanning an IP. Take care that the |
|
# command is executed with Fail2Ban user rights. |
|
# Tags: See jail.conf(5) man page |
|
# Values: CMD |
|
# |
|
actionunban = ipset -exist del <ipmset> <ip> |
|
|
|
# Several capabilities used internally: |
|
|
|
rule-jump = -m set --match-set <ipmset> src -j <blocktype> |
|
|
|
|
|
[Init] |
|
|
|
# Option: ipsettype |
|
# Notes: specifies type of set, see `man --pager='less -p "^SET TYPES"' ipset` for details |
|
# Values: hash:ip, hash:net, etc... Default: hash:ip |
|
ipsettype = hash:ip |
|
|
|
# Option: default-ipsettime |
|
# Notes: specifies default timeout in seconds (handled default ipset timeout only) |
|
# Values: [ NUM ] Default: 0 (no timeout, managed by fail2ban by unban) |
|
default-ipsettime = 0 |
|
|
|
# Option: ipsettime |
|
# Notes: specifies ticket timeout (handled ipset timeout only) |
|
# Values: [ NUM ] Default: 0 (managed by fail2ban by unban) |
|
ipsettime = 0 |
|
|
|
# Option: maxelem |
|
# Notes: maximal number of elements which can be stored in the ipset |
|
# You may want to increase this for long-duration/high-volume jails |
|
# Values: [ NUM ] Default: 65536 |
|
maxelem = 65536 |
|
|
|
# expression to calculate timeout from bantime, example: |
|
# banaction = %(known/banaction)s[ipsettime='<timeout-bantime>'] |
|
timeout-bantime = $([ "<bantime>" -le 2147483 ] && echo "<bantime>" || echo 0) |
|
|
|
ipmset = f2b-<name> |
|
familyopt = |
|
|
|
|
|
[Init?family=inet6] |
|
|
|
ipmset = f2b-<name>6 |
|
familyopt = family inet6
|
|
|