Created
May 18, 2018 15:57
-
-
Save 5car1z/9c143fd17e61d074ec95207380ba9969 to your computer and use it in GitHub Desktop.
Fail2ban Jail configuration file; for an Ansible playbook example.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[DEFAULT] | |
# email address to receive notifications. | |
destemail = root@localhost | |
# the email address from which to send emails. | |
sender = root@<fq-hostname> | |
# name on the notification emails. | |
sendername = Fail2Ban | |
# email transfer agent to use. | |
mta = sendmail | |
# see action.d/ufw.conf | |
actionban = ufw.conf | |
# see action.d/ufw.conf | |
actionunban = ufw.conf | |
[sshd] | |
enabled = true | |
port = ssh | |
filter = sshd | |
# the length of time between login attempts for maxretry. | |
findtime = 600 | |
# attempts from a single ip before a ban is imposed. | |
maxretry = 5 | |
# the number of seconds that a host is banned for. | |
bantime = 3600 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
https://www.tricksofthetrades.net/2018/05/19/ansible-fail2ban-playbook/