⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.82
Server IP:
41.128.143.86
Server:
Linux host.raqmix.cloud 6.8.0-1025-azure #30~22.04.1-Ubuntu SMP Wed Mar 12 15:28:20 UTC 2025 x86_64
Server Software:
Apache
PHP Version:
8.3.23
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
doc
/
fail2ban
/
dist-config
/
action.d
/
View File Name :
firewallcmd-allports.conf
# Fail2Ban configuration file # # Author: Donald Yandt # Because of the --remove-rules in stop this action requires firewalld-0.3.8+ [INCLUDES] before = firewallcmd-common.conf [Definition] actionstart = firewall-cmd --direct --add-chain
filter f2b-
firewall-cmd --direct --add-rule
filter f2b-
1000 -j RETURN firewall-cmd --direct --add-rule
filter
0 -j f2b-
actionstop = firewall-cmd --direct --remove-rule
filter
0 -j f2b-
firewall-cmd --direct --remove-rules
filter f2b-
firewall-cmd --direct --remove-chain
filter f2b-
# Example actioncheck: firewall-cmd --direct --get-chains ipv4 filter | sed -e 's, ,\n,g' | grep -q '^f2b-recidive$' actioncheck = firewall-cmd --direct --get-chains
filter | sed -e 's, ,\n,g' | grep -q '^f2b-
$' actionban = firewall-cmd --direct --add-rule
filter f2b-
0 -s
-j
actionunban = firewall-cmd --direct --remove-rule
filter f2b-
0 -s
-j
# DEV NOTES: # # Author: Donald Yandt # Uses "FirewallD" instead of the "iptables daemon". # # # Output: # actionstart: # $ firewall-cmd --direct --add-chain ipv4 filter f2b-recidive # success # $ firewall-cmd --direct --add-rule ipv4 filter f2b-recidive 1000 -j RETURN # success # $ sudo firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 0 -j f2b-recidive # success