The "iptables" firewall comes with various extension modules that can be used to enhance its basic functionality. One such extension is the "recent" module. It allows you to match recent connections and apply throttling to incoming connections. This feature can be handy for managing network traffic. Here is how to limit SSH (TCP/22) traffic to protect from bots or hackers https://www.cyberciti.biz/faq/howto-limiting-ssh-connections-with-ufw-on-ubuntu-debian/ #sysadmin #linux #infosec #security
Conversation
Notices
-
nixCraft 🐧 (nixcraft@mastodon.social)'s status on Tuesday, 05-Mar-2024 17:54:54 JST nixCraft 🐧 -
nixCraft 🐧 (nixcraft@mastodon.social)'s status on Tuesday, 05-Mar-2024 21:42:20 JST nixCraft 🐧 @klausman @nixCraft it is actually nftables on most modern linux distributions. They have kept iptables syntax for backward compatibility reasons
-
Tobias Klausmann (klausman@mas.to)'s status on Tuesday, 05-Mar-2024 21:42:22 JST Tobias Klausmann @nixCraft Can UFW also target nftables? Because iptables is sorta on the way out.
-
nixCraft 🐧 (nixcraft@mastodon.social)'s status on Tuesday, 05-Mar-2024 21:42:56 JST nixCraft 🐧 -
Josh Cheshire :padres: (josh@barelysocial.org)'s status on Tuesday, 05-Mar-2024 21:42:57 JST Josh Cheshire :padres: @nixCraft You say it’s limited to IPv4, but your table shows a LIMIT rule for port 22 on IPv4 and IPv6. Obviously I’ll be testing it later today to verify, but is one of those a typo?
-