jail.local 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113
  1. [freeswitch-udp]
  2. enabled = true
  3. port = 5060,5061,5080,5081
  4. protocol = all
  5. filter = freeswitch
  6. logpath = /var/log/freeswitch/freeswitch.log
  7. action = iptables-multiport[name=freeswitch-udp, port="5060,5061,5080,5081", protocol=udp]
  8. maxretry = 5
  9. findtime = 600
  10. bantime = 600
  11. # sendmail-whois[name=FreeSwitch, dest=root, [email protected]] #no smtp server installed
  12. [freeswitch-tcp]
  13. enabled = true
  14. port = 5060,5061,5080,5081
  15. protocol = all
  16. filter = freeswitch
  17. logpath = /var/log/freeswitch/freeswitch.log
  18. action = iptables-multiport[name=freeswitch-tcp, port="5060,5061,5080,5081", protocol=tcp]
  19. maxretry = 5
  20. findtime = 600
  21. bantime = 600
  22. # sendmail-whois[name=FreeSwitch, dest=root, [email protected]] #no smtp server installed
  23. [freeswitch-ip-tcp]
  24. enabled = false
  25. port = 5060,5061,5080,5081
  26. protocol = all
  27. filter = freeswitch-ip
  28. logpath = /var/log/freeswitch/freeswitch.log
  29. action = iptables-multiport[name=freeswitch-ip-tcp, port="5060,5061,5080,5081", protocol=tcp]
  30. maxretry = 1
  31. findtime = 30
  32. bantime = 86400
  33. [freeswitch-ip-udp]
  34. enabled = false
  35. port = 5060,5061,5080,5081
  36. protocol = all
  37. filter = freeswitch-ip
  38. logpath = /var/log/freeswitch/freeswitch.log
  39. action = iptables-multiport[name=freeswitch-ip-udp, port="5060,5061,5080,5081", protocol=udp]
  40. maxretry = 1
  41. findtime = 30
  42. bantime = 86400
  43. [freeswitch-dos-udp]
  44. enabled = true
  45. port = 5060,5061,5080,5081
  46. protocol = all
  47. filter = freeswitch-dos
  48. logpath = /var/log/freeswitch/freeswitch.log
  49. action = iptables-multiport[name=freeswitch-dos-udp, port="5060,5061,5080,5081", protocol=udp]
  50. maxretry = 50
  51. findtime = 30
  52. bantime = 6000
  53. [freeswitch-dos-tcp]
  54. enabled = true
  55. port = 5060,5061,5080,5081
  56. protocol = all
  57. filter = freeswitch-dos
  58. logpath = /var/log/freeswitch/freeswitch.log
  59. action = iptables-multiport[name=freeswitch-dos-tcp, port="5060,5061,5080,5081", protocol=tcp]
  60. maxretry = 50
  61. findtime = 30
  62. bantime = 6000
  63. [freeswitch-404]
  64. enabled = true
  65. port = 5060,5061,5080,5081
  66. protocol = all
  67. filter = freeswitch-404
  68. logpath = /var/log/freeswitch/freeswitch.log
  69. action = iptables-allports[name=freeswitch-404, protocol=all]
  70. maxretry = 3
  71. findtime = 300
  72. bantime = 86400
  73. #[fusionpbx]
  74. #enabled = true
  75. #port = 80,443
  76. #protocol = tcp
  77. #filter = fusionpbx
  78. #logpath = /var/log/auth.log
  79. #action = iptables-multiport[name=fusionpbx, port="http,https", protocol=tcp]
  80. # sendmail-whois[name=fusionpbx, dest=root, [email protected]] #no smtp server installed
  81. #maxretry = 10
  82. #findtime = 600
  83. #bantime = 600
  84. [nginx-404]
  85. enabled = true
  86. port = 80,443
  87. protocol = tcp
  88. filter = nginx-404
  89. logpath = /var/log/nginx/access*.log
  90. bantime = 3600
  91. findtime = 60
  92. maxretry = 120
  93. [nginx-dos]
  94. # Based on apache-badbots but a simple IP check (any IP requesting more than
  95. # 240 pages in 60 seconds, or 4p/s average, is suspicious)
  96. # Block for two full days.
  97. enabled = false
  98. port = 80,443
  99. protocol = tcp
  100. filter = nginx-dos
  101. logpath = /var/log/nginx/access*.log
  102. findtime = 60
  103. bantime = 86400
  104. maxretry = 240