<feed xmlns='http://www.w3.org/2005/Atom'>
<title>veeos-1x.git/data/templates/ssh/sshguard_config.tmpl, branch equuleus</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos-contrib/veeos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos-contrib/veeos-1x.git/atom?h=equuleus</id>
<link rel='self' href='https://git.amelek.net/vyos-contrib/veeos-1x.git/atom?h=equuleus'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos-contrib/veeos-1x.git/'/>
<updated>2023-07-19T14:39:45+00:00</updated>
<entry>
<title>sshguard: T5354: Add service ssh dynamic-protection</title>
<updated>2023-07-19T14:39:45+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2023-07-19T14:39:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos-contrib/veeos-1x.git/commit/?id=cd6f7994a9c5d6501ce56b57362c7f33f64fa3d5'/>
<id>urn:sha1:cd6f7994a9c5d6501ce56b57362c7f33f64fa3d5</id>
<content type='text'>
Sshguard protects hosts from brute-force attacks
It can inspect logs and block "bad" addresses by threshold
Auto-generates own tables and rules for nftables, so they are not
intercept with VyOS firewall rules.
When service stops, all generated tables are deleted.

set service ssh dynamic-protection
set service ssh dynamic-protection allow-from '192.0.2.1'
set service ssh dynamic-protection block-time '120'
set service ssh dynamic-protection detect-time '1800'
set service ssh dynamic-protection threshold '30'
</content>
</entry>
</feed>
