diff options
author | goodNETnick <pknet@ya.ru> | 2022-07-23 03:52:16 -0400 |
---|---|---|
committer | goodNETnick <pknet@ya.ru> | 2022-07-23 03:52:16 -0400 |
commit | 8189e1c7b529dd4c0bdaea17eeb4e978e5f841fc (patch) | |
tree | 0c11cd5909020eb63accbdc9994c159eea75ee7c /docs/configuration/service/ssh.rst | |
parent | ed5a43bcc55749b3beed0c7bf3cf76d69ed1f0fb (diff) | |
parent | 0448c16d4a9bc80c6cd9e7d3a171ba0749acb6ce (diff) | |
download | vyos-documentation-8189e1c7b529dd4c0bdaea17eeb4e978e5f841fc.tar.gz vyos-documentation-8189e1c7b529dd4c0bdaea17eeb4e978e5f841fc.zip |
Merge branch 'master' of https://github.com/goodNETnick/vyos-documentation
Diffstat (limited to 'docs/configuration/service/ssh.rst')
-rw-r--r-- | docs/configuration/service/ssh.rst | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/docs/configuration/service/ssh.rst b/docs/configuration/service/ssh.rst index ad410a3c..baf17035 100644 --- a/docs/configuration/service/ssh.rst +++ b/docs/configuration/service/ssh.rst @@ -109,6 +109,36 @@ Configuration Specify name of the :abbr:`VRF (Virtual Routing and Forwarding)` instance. +Dynamic-protection +================== +Protects host from brute-force attacks against +SSH. Log messages are parsed, line-by-line, for recognized patterns. If an +attack, such as several login failures within a few seconds, is detected, the +offending IP is blocked. Offenders are unblocked after a set interval. + +.. cfgcmd:: set service ssh dynamic-protection + + Allow ``ssh`` dynamic-protection. + +.. cfgcmd:: set service ssh dynamic-protection allow-from <address | prefix> + + Whitelist of addresses and networks. Always allow inbound connections from + these systems. + +.. cfgcmd:: set service ssh dynamic-protection block-time <sec> + + Block source IP in seconds. Subsequent blocks increase by a factor of 1.5 + The default is 120. + +.. cfgcmd:: set service ssh dynamic-protection detect-time <sec> + + Remember source IP in seconds before reset their score. The default is 1800. + +.. cfgcmd:: set service ssh dynamic-protection threshold <sec> + + Block source IP when their cumulative attack score exceeds threshold. The + default is 30. + Operation ========= |