Fork of FusionPBX but with LDAP kinda working
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

143 lines
3.6 KiB

  1. [ssh]
  2. enabled = true
  3. port = 22
  4. protocol = ssh
  5. filter = sshd
  6. logpath = /var/log/auth.log
  7. action = iptables-allports[name=sshd, protocol=all]
  8. maxretry = 6
  9. findtime = 60
  10. bantime = 86400
  11. [freeswitch]
  12. enabled = false
  13. port = 5060:5091
  14. protocol = all
  15. filter = freeswitch
  16. logpath = /var/log/freeswitch/freeswitch.log
  17. #logpath = /usr/local/freeswitch/log/freeswitch.log
  18. action = iptables-allports[name=freeswitch, protocol=all]
  19. maxretry = 10
  20. findtime = 60
  21. bantime = 3600
  22. # sendmail-whois[name=FreeSwitch, dest=root, sender=fail2ban@example.org] #no smtp server installed
  23. [freeswitch-acl]
  24. enabled = false
  25. port = 5060:5091
  26. protocol = all
  27. filter = freeswitch-acl
  28. logpath = /var/log/freeswitch/freeswitch.log
  29. #logpath = /usr/local/freeswitch/log/freeswitch.log
  30. action = iptables-allports[name=freeswitch-acl, protocol=all]
  31. maxretry = 900
  32. findtime = 60
  33. bantime = 86400
  34. [freeswitch-ip]
  35. enabled = false
  36. port = 5060:5091
  37. protocol = all
  38. filter = freeswitch-ip
  39. logpath = /var/log/freeswitch/freeswitch.log
  40. #logpath = /usr/local/freeswitch/log/freeswitch.log
  41. action = iptables-allports[name=freeswitch-ip, protocol=all]
  42. maxretry = 1
  43. findtime = 60
  44. bantime = 86400
  45. [auth-challenge-ip]
  46. enabled = false
  47. port = 5060:5091
  48. protocol = all
  49. filter = auth-challenge-ip
  50. logpath = /var/log/freeswitch/freeswitch.log
  51. #logpath = /usr/local/freeswitch/log/freeswitch.log
  52. action = iptables-allports[name=auth-challenge-ip, protocol=all]
  53. maxretry = 1
  54. findtime = 60
  55. bantime = 86400
  56. [sip-auth-challenge]
  57. enabled = false
  58. port = 5060:5091
  59. protocol = all
  60. filter = sip-auth-challenge
  61. logpath = /var/log/freeswitch/freeswitch.log
  62. #logpath = /usr/local/freeswitch/log/freeswitch.log
  63. action = iptables-allports[name=sip-auth-challenge, protocol=all]
  64. maxretry = 100
  65. findtime = 60
  66. bantime = 7200
  67. [sip-auth-failure]
  68. enabled = false
  69. port = 5060:5091
  70. protocol = all
  71. filter = sip-auth-failure
  72. logpath = /var/log/freeswitch/freeswitch.log
  73. #logpath = /usr/local/freeswitch/log/freeswitch.log
  74. action = iptables-allports[name=sip-auth-failure, protocol=all]
  75. maxretry = 6
  76. findtime = 60
  77. bantime = 7200
  78. [fusionpbx-404]
  79. enabled = false
  80. port = 5060:5091
  81. protocol = all
  82. filter = fusionpbx-404
  83. logpath = /var/log/freeswitch/freeswitch.log
  84. #logpath = /usr/local/freeswitch/log/freeswitch.log
  85. action = iptables-allports[name=fusionpbx-404, protocol=all]
  86. maxretry = 6
  87. findtime = 60
  88. bantime = 86400
  89. [fusionpbx]
  90. enabled = true
  91. port = 80,443
  92. protocol = tcp
  93. filter = fusionpbx
  94. logpath = /var/log/auth.log
  95. action = iptables-allports[name=fusionpbx, protocol=all]
  96. # sendmail-whois[name=fusionpbx, dest=root, sender=fail2ban@example.org] #no smtp server installed
  97. maxretry = 20
  98. findtime = 60
  99. bantime = 3600
  100. [fusionpbx-mac]
  101. enabled = true
  102. port = 80,443
  103. protocol = tcp
  104. filter = fusionpbx-mac
  105. logpath = /var/log/syslog
  106. action = iptables-allports[name=fusionpbx-mac, protocol=all]
  107. # sendmail-whois[name=fusionpbx-mac, dest=root, sender=fail2ban@example.org] #no smtp server installed
  108. maxretry = 10
  109. findtime = 60
  110. bantime = 86400
  111. [nginx-404]
  112. enabled = true
  113. port = 80,443
  114. protocol = tcp
  115. filter = nginx-404
  116. logpath = /var/log/nginx/access*.log
  117. action = iptables-allports[name=nginx-404, protocol=all]
  118. bantime = 3600
  119. findtime = 60
  120. maxretry = 300
  121. [nginx-dos]
  122. # Based on apache-badbots but a simple IP check (any IP requesting more than
  123. # 300 pages in 60 seconds, or 5p/s average, is suspicious)
  124. enabled = true
  125. port = 80,443
  126. protocol = tcp
  127. filter = nginx-dos
  128. logpath = /var/log/nginx/access*.log
  129. action = iptables-allports[name=nginx-dos, protocol=all]
  130. findtime = 60
  131. bantime = 86400
  132. maxretry = 800