Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks. Written in the Python programming language, it is able to run on POSIX systems that have an interface to a packet-control system or firewall installed locally, for example, iptables or TCP Wrapper.
Fail2Ban operates by monitoring log files (i.e. /var/log/secure.log, /var/www/haproxy-wi/log/haproxy-wi.log, etc.) for selected entries and running scripts based on them. Most commonly this is used to block selected IP addresses that may belong to hosts that are trying to breach the system's security. It can ban any host IP address that makes too many login attempts or performs any other unwanted action within a time frame defined by the administrator. Includes support for both IPv4 and IPv6. Optionally longer bans can be custom-configure for "recidivist" abusers that keep coming back. Fail2Ban is typically set up to unban a blocked host within a certain period, so as to not "lock out" any genuine connections that may have been temporarily misconfigured. However, an unban time of several minutes is usually enough to stop a network connection being flooded by malicious connections, as well as reducing the likelihood of a successful dictionary attack.
HAProxy-WI started work with Fail2ban since v4.3.0. Fail2ban protects by default: SSH, HAProxy-WI and Apache against different brute-force attacks.
Fail2ban is disable by default. If you would like to start protect your server you should enable it in the "Admin Area" on the "Services" page.
|Login (without "@"):|
|RPM or/and Docker?|