Hi,
I am trying to implement a shared interface jail setup using bastille and to stop bruteforcing using sshguard.
I am using the following configuration from the bastille documentation:
Where and how would I need to put the <sshguard> pf table that holds all blacklisted hosts, if I want the blacklisted hosts to be locked out from both all NATed services and the hosts services?
I manage to block access to the hosts services (like sshd), but fail to block access to the jails because the NAT rules are applied before the block rules.
Thank you,
klauspeter
I am trying to implement a shared interface jail setup using bastille and to stop bruteforcing using sshguard.
I am using the following configuration from the bastille documentation:
Code:
ext_if="vtnet0"
set block-policy return
scrub in on $ext_if all fragment reassemble
set skip on lo
table <jails> persist
nat on $ext_if from <jails> to any -> ($ext_if:0)
rdr-anchor "rdr/*"
block in all
pass out quick keep state
antispoof for $ext_if inet
pass in inet proto tcp from any to any port ssh flags S/SA modulate state
Where and how would I need to put the <sshguard> pf table that holds all blacklisted hosts, if I want the blacklisted hosts to be locked out from both all NATed services and the hosts services?
I manage to block access to the hosts services (like sshd), but fail to block access to the jails because the NAT rules are applied before the block rules.
Thank you,
klauspeter