Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block after X attempts for X minutes

    Scheduled Pinned Locked Moved Firewalling
    1 Posts 1 Posters 293 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      beedix
      last edited by

      I've got a few firewall rules right before my default deny rule.  These rules log common port's that are scanned just so I can see who's scanning SSH and a few others.

      Is there a better way to handle this?  The traffic is already blocked but perhaps a way to block access to anything\everything for a period of time for their bad behavior?

      I see a "Max. src. conn. Rate" and "Max. src. conn. Rates" setting in advance, but I'm unclear if these could be used and I haven't seen a good example.  Is this what I'm looking for?

      Greatly appreciated for the help

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.