This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
сервис_fail2ban [2024/05/10 07:29] val [Блокировка через cisco acl] |
сервис_fail2ban [2025/06/22 16:06] (current) val [Мониторинг и управление] |
||
---|---|---|---|
Line 14: | Line 14: | ||
# apt install fail2ban | # apt install fail2ban | ||
- | ubuntu24# wget https://launchpad.net/ubuntu/+source/fail2ban/1.1.0-1/+build/28291332/+files/fail2ban_1.1.0-1_all.deb | + | ubuntu24# ###wget https://launchpad.net/ubuntu/+source/fail2ban/1.1.0-1/+build/28291332/+files/fail2ban_1.1.0-1_all.deb |
- | ubuntu24# dpkg -i fail2ban_1.1.0-1_all.deb | + | ubuntu24# ###dpkg -i fail2ban_1.1.0-1_all.deb |
</code> | </code> | ||
Line 35: | Line 35: | ||
[sshd] | [sshd] | ||
maxretry = 6 | maxretry = 6 | ||
+ | #port = 2222 | ||
#ignoreip = 192.168.X.0/24 192.168.100+X.0/24 | #ignoreip = 192.168.X.0/24 192.168.100+X.0/24 | ||
Line 43: | Line 44: | ||
#action = iptables-allports[blocktype=DROP] | #action = iptables-allports[blocktype=DROP] | ||
#action = route[blocktype=blackhole] | #action = route[blocktype=blackhole] | ||
+ | |||
+ | #https://github.com/fail2ban/fail2ban/discussions/3836|Asterisk 20.6 on Ubuntu 24.04: Fail2Ban not working | ||
+ | #backend = auto | ||
+ | #logpath = /var/log/asterisk/messages.log | ||
</code> | </code> | ||
Line 58: | Line 63: | ||
# fail2ban-client status asterisk | # fail2ban-client status asterisk | ||
+ | |||
+ | # nft list ruleset | ||
# fail2ban-client set asterisk unbanip 172.16.1.150 | # fail2ban-client set asterisk unbanip 172.16.1.150 | ||
Line 97: | Line 104: | ||
* [[https://github.com/frankiejol/snortban|frankiejol/snortban]] | * [[https://github.com/frankiejol/snortban|frankiejol/snortban]] | ||
+ | * Сервис SNORT [[Сервис SNORT#Копирование alert_unified2 в syslog]] | ||
<code> | <code> | ||
Line 108: | Line 116: | ||
logpath = /var/log/auth.log | logpath = /var/log/auth.log | ||
#action = mail-admin | #action = mail-admin | ||
+ | #action = iptables-allports | ||
#action = iptables-allports-forward | #action = iptables-allports-forward | ||
#action = cisco-acl | #action = cisco-acl | ||
Line 117: | Line 126: | ||
failregex = .*snort.*Priority: 1.*} <HOST>.* | failregex = .*snort.*Priority: 1.*} <HOST>.* | ||
# .*snort.*Priority: 2.*} <HOST>.* | # .*snort.*Priority: 2.*} <HOST>.* | ||
+ | |||
+ | #failregex = .*Original Client IP: <HOST>.* | ||
</code> | </code> | ||
Line 196: | Line 207: | ||
#!/bin/sh | #!/bin/sh | ||
- | cat > /root/firewall.acl <<EOF | + | cat > /srv/tftp/firewall.acl <<EOF |
no ip access-list extended ACL_FIREWALL | no ip access-list extended ACL_FIREWALL | ||
ip access-list extended ACL_FIREWALL | ip access-list extended ACL_FIREWALL | ||
EOF | EOF | ||
- | /root/cisco-acl-deny.sh >> /root/firewall.acl | + | /root/cisco-acl-deny.sh >> /srv/tftp/firewall.acl |
- | cat /root/cisco-acl-permit.txt >> /root/firewall.acl | + | cat /root/cisco-acl-permit.txt >> /srv/tftp/firewall.acl |
- | /usr/bin/rcp /root/firewall.acl router:running-config | + | #/usr/bin/rcp /srv/tftp/firewall.acl router:running-config |
+ | #/usr/bin/snmpset -c write -v2c router .1.3.6.1.4.1.9.2.1.53.192.168.X.10 string "firewall.acl" | ||
</code><code> | </code><code> | ||
# cat /etc/fail2ban/action.d/cisco-acl.conf | # cat /etc/fail2ban/action.d/cisco-acl.conf |