![]() ufw will deny connections if an IP # address has attempted to initiate 6 or more connections in the last # 30 seconds. In addition, log rejected connections: - : rule : reject port : auth log : true # ufw supports connection rate limiting, which is useful for protecting # against brute-force login attacks. In these cases, use # reject instead of deny. name : Allow everything and enable UFW : state : enabled policy : allow - name : Set logging : logging : 'on' # Sometimes it is desirable to let the sender know when traffic is # being denied, rather than simply ignoring it.
0 Comments
Leave a Reply. |