Sending max connection offenders to custom table

  • I was setting up a rule to block people trying to brute force ssh. I went into advanced and found the rate limiting options, but noticed there was no overload, drop to table option. However, I found when I viewed the rules it was dropping them in an internal table that is getting blocked: overload <virusprot>Just wondering if there was a way to drop these in a custom table (created via firewall, aliases) So that I can be spiteful and preserve my blocked IP list in my backed-up config file. (I'm assuming virusprot gets cleared on a reboot too) It looks like this is not currently supported in the GUI rule creation, but I thought I'd ask just to see if I was missing something.</virusprot>

  • No, it is not possible unfortunately.

Log in to reply