# Fail2Ban configuration file # # Author: Russell Odom # Submits attack reports to myNetWatchman (http://www.mynetwatchman.com/) # # You MUST configure at least: # (the port that's being attacked - use number not name). # (your mNW login). # (your mNW password). # # You SHOULD also provide: # (your public IP address, if it's not the address of eth0) # (the protocol in use - defaults to tcp) # # Best practice is to provide and in jail.conf like this: # action = mynetwatchman[port=1234,protocol=udp] # # ...and create "mynetwatchman.local" with contents something like this: # [Init] # mnwlogin = me@example.com # mnwpass = SECRET # myip = 10.0.0.1 # # Another useful configuration value is , if you don't have wget # installed (an example config for curl is given below) # [Definition] # Option: actionstart # Notes.: command executed on demand at the first ban (or at the start of Fail2Ban if actionstart_on_demand is set to false). # Values: CMD # actionstart = # Option: actionstop # Notes.: command executed at the stop of jail (or at the end of Fail2Ban) # Values: CMD # actionstop = # Option: actioncheck # Notes.: command executed once before each actionban command # Values: CMD # actioncheck = # Option: actionban # Notes.: command executed when banning an IP. Take care that the # command is executed with Fail2Ban user rights. # Tags: See jail.conf(5) man page # Values: CMD # # # Note: We are currently using