VESTACP Time Lock fail2ban
VESTACP Time Lock fail2ban
By default, the panel Vestacp bans unauthorized login using fail2ban is, however, a catch automatically after some time addresses to unblock.
Below is a way to block IP addresses 365 Days.
edit file:
1 | /etc/fail2ban/jail.local |
We find the line:
1 | maxretry = 5 |
Underneath we add:
1 | bantime = 31536000 |
The entire file should be as follows:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 | [ssh-iptables] enabled = true filter = sshd action = vesta[name=SSH] logpath = /var/log/secure maxretry = 5 bantime = 31536000 [vsftpd-iptables] enabled = false filter = vsftpd action = vesta[name=FTP] logpath = /var/log/vsftpd.log maxretry = 5 bantime = 31536000 [exim-iptables] enabled = true filter = exim action = vesta[name=MAIL] logpath = /var/log/exim/main.log [dovecot-iptables] enabled = true filter = dovecot action = vesta[name=MAIL] logpath = /var/log/dovecot.log [mysqld-iptables] enabled = false filter = mysqld-auth action = vesta[name=DB] logpath = /var/log/mysqld.log maxretry = 5 bantime = 31536000 [vesta-iptables] enabled = true filter = vesta action = vesta[name=VESTA] logpath = /var/log/vesta/auth.log maxretry = 5 bantime = 31536000 |