mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
Merge pull request #782 from sever-sever/sshguard
sshguard: Add ssh dynamic-protection
This commit is contained in:
commit
336b4498b8
@ -109,6 +109,36 @@ Configuration
|
|||||||
|
|
||||||
Specify name of the :abbr:`VRF (Virtual Routing and Forwarding)` instance.
|
Specify name of the :abbr:`VRF (Virtual Routing and Forwarding)` instance.
|
||||||
|
|
||||||
|
Dynamic-protection
|
||||||
|
==================
|
||||||
|
Protects host from brute-force attacks against
|
||||||
|
SSH. Log messages are parsed, line-by-line, for recognized patterns. If an
|
||||||
|
attack, such as several login failures within a few seconds, is detected, the
|
||||||
|
offending IP is blocked. Offenders are unblocked after a set interval.
|
||||||
|
|
||||||
|
.. cfgcmd:: set service ssh dynamic-protection
|
||||||
|
|
||||||
|
Allow ``ssh`` dynamic-protection.
|
||||||
|
|
||||||
|
.. cfgcmd:: set service ssh dynamic-protection allow-from <address | prefix>
|
||||||
|
|
||||||
|
Whitelist of addresses and networks. Always allow inbound connections from
|
||||||
|
these systems.
|
||||||
|
|
||||||
|
.. cfgcmd:: set service ssh dynamic-protection block-time <sec>
|
||||||
|
|
||||||
|
Block source IP in seconds. Subsequent blocks increase by a factor of 1.5
|
||||||
|
The default is 120.
|
||||||
|
|
||||||
|
.. cfgcmd:: set service ssh dynamic-protection detect-time <sec>
|
||||||
|
|
||||||
|
Remember source IP in seconds before reset their score. The default is 1800.
|
||||||
|
|
||||||
|
.. cfgcmd:: set service ssh dynamic-protection threshold <sec>
|
||||||
|
|
||||||
|
Block source IP when their cumulative attack score exceeds threshold. The
|
||||||
|
default is 30.
|
||||||
|
|
||||||
Operation
|
Operation
|
||||||
=========
|
=========
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user