You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
And here is how Fail2Ban manipulates `iptables` by default, though ideally Fail2Ban is configured to utilize
407
-
`nftables`, [a modernized and significantly improved firewall solution](https://debian-handbook.info/browse/stable/sect.firewall-packet-filtering.html),
408
-
or `firewalld` which has access to firewall [architectures](https://firewalld.org/documentation/architecture.html) like `iptables`, and `nftables`.
427
+
Ideally Fail2Ban is configured to utilize `nftables`, [a modernized and significantly improved Linux firewall backend solution](https://wiki.debian.org/nftables),
428
+
and some type of firewall backend wrapper like `firewalld` which can be configured for specific firewall backend
429
+
[architectures](https://firewalld.org/documentation/architecture.html) like `iptables`, and `nftables`.
409
430
410
431
Configuring Fail2Ban with `firewalld` or `nftables` will look like such:
411
432
@@ -432,8 +453,8 @@ I highly, highly encourage students have a working understanding of Linux firewa
432
453
It's important to be stated that this should be understood as a **mitigation**, not a perfect solution. Primarily
433
454
to minimize automated bots scraping a domain, usually for nefarious purposes.
434
455
435
-
And I will iterate there are far better solutionsfor free ([Cloudflare WAF](https://developers.cloudflare.com/waf/get-started/))
436
-
that protect more intelligently and robustly than Fail2Ban. Migrating your domain over to Cloudflare or equivalent service
456
+
And I will iterate that there are far better solutions. Some for free and others, ([Cloudflare WAF](https://developers.cloudflare.com/waf/get-started/)),
457
+
for a modest fee that protect more intelligently and robustly than Fail2Ban. Migrating your domain over to Cloudflare or equivalent service
437
458
is probably the far smarter and less work intensive task than a comprehensive Fail2Ban setup. But I like to think we're building our
438
459
muscles... you know, putting in reps.
439
460
@@ -454,14 +475,15 @@ enabled = true
454
475
port = http,https
455
476
logpath = %(nginx_access_log)s
456
477
```
457
-
Be sure to fave the file:
478
+
479
+
Append these lines to the earlier file we implemented after our SSHD section and let the regex do the work for us.
480
+
481
+
Be sure to save the file:
458
482
459
483
```bash
460
484
:wq
461
485
```
462
486
463
-
Append these lines to the earlier file we implemented after our SSHD section and let the regex do the work for us.
0 commit comments