Fail2ban uses iptables by default to block incoming connections when they exceed the max. login retries. The iptables rules used by fail2ban might conflict with other firewall rules, so it might be necessary to reconfigure fail2ban to use the route command for blocking incoming connections.
To reconfigure fail2ban for using the route command instead of iptables, edit or create the route.conf file:
nano /etc/fail2ban/action.d/route.conf
There you insert the following lines:
# Fail2Ban configuration file [Definition] actionban = ip route add unreachable actionunban = ip route del unreachable
Then add or change the ban action in the jail.local file in the [DEFAULT] section to “route”:
nano/etc/fail2ban/jail.local
And add or edit these lines:
# Fail2Ban configuration file [DEFAULT] banaction = route
The post Configure fail2ban to use route instead of iptables to block connections appeared first on FAQforge.
Canonical’s Kubernetes LTS (Long Term Support) will support FedRAMP compliance and receive at least 12…
Welcome to the Ubuntu Weekly Newsletter, Issue 878 for the week of February 2 –…
At Canonical, we firmly believe that delivering an outstanding, customer-centric support experience is impossible without…
I want to share how to install osTicket v1.14 for Ubuntu 20.04 server. osTicket written…
Now I want to share how to install WordPress on ubuntu 20.04 server. WordPress is…
Now I want to share the DNS server installation process on your Ubuntu 20.04 server.…