Sponsored Content
Operating Systems Linux Fedora /var/log/btmp size 2.2Gb daily Post 302948827 by feroccimx on Thursday 2nd of July 2015 07:18:51 PM
Old 07-02-2015
Installed & configured fail2ban with
Code:
bantime  = 86400

It already started working as seen in logs:

Code:
# grep " Ban " /var/log/fail2ban.log | wc -l
3
#
# iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
fail2ban-SSH  tcp  --  anywhere             anywhere            tcp dpt:ssh

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Chain fail2ban-SSH (1 references)
target     prot opt source               destination
DROP       all  --  43.255.189.21        anywhere
DROP       all  --  209.222.5.233.choopa.com  anywhere
RETURN     all  --  anywhere             anywhere

Thank you for all your assistance!

---------- Post updated at 06:18 PM ---------- Previous update was at 05:55 PM ----------

Forgot to ask if is there any way to report offender IPs??
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File size exceeding 2GB

I am working on HP-Unix. I have a 600 MB file in compressed form. During decompression, when file size reaches 2GB, decompression aborts. What should be done? (3 Replies)
Discussion started by: Nadeem Mistry
3 Replies

2. Solaris

SUN Solaris 9 - Is there a 2GB file size limit?

Hi I am using SUN/Solaris 9 and I was told that some unix versions have 2GB size limit. Does this applies to SUN/Solaris 9? Thanks. (2 Replies)
Discussion started by: GMMike
2 Replies

3. UNIX for Dummies Questions & Answers

MAX file size limited to 2GB

Hi All, We are running HP rp7400 box with hpux 11iv1. Recently, we changed 3 kernel parameters a) msgseg from 32560 to 32767 b) msgmnb from 65536 to 65535 c) msgssz from 128 to 256 Then we noticed that all application debug file size increase upto 2GB then it stops. So far we did not... (1 Reply)
Discussion started by: mhbd
1 Replies

4. Solaris

sometime /var/adm/messages size 0

Hi experts, sometimes i notice in my Solaris 9 /var/adm/messages size 0. It continues for 1/2 days then again /var/adm/messages is start filling up with logs!!! What could be reason behind it. and if its a problem what could be the solution. //purple (1 Reply)
Discussion started by: thepurple
1 Replies

5. SuSE

grow /var size how

Hi all, I am using SLES 9 and have following partitions mounted I would like to make /var 10G atleast. fdisk -l This system is doing RAID5(HW). Can someone help me with this issue? Thanks (4 Replies)
Discussion started by: upengan78
4 Replies

6. Solaris

diff b/w /var/log/syslog and /var/adm/messages

hi sirs can u tell the difference between /var/log/syslogs and /var/adm/messages in my working place i am having two servers. in one servers messages file is empty and syslog file is going on increasing.. and in another servers message file is going on increasing but syslog file is... (2 Replies)
Discussion started by: tv.praveenkumar
2 Replies

7. What is on Your Mind?

Linux Centos 5.4 BTMP file size

Dear fellows, I have Centos 5.4 linux with DNS server, all logs are normal, in my /var/log/ btmp files is getting larger day by day. What is this btmp file for? How can i reduce the file siez or control file size. Waiting. MAZ (1 Reply)
Discussion started by: maz
1 Replies

8. Solaris

Difference between /var/log/syslog and /var/adm/messages

Hi, Is the contents in /var/log/syslog and /var/adm/messages are same?? Regards (3 Replies)
Discussion started by: vks47
3 Replies

9. HP-UX

2GB file size limit

Greetings, I'm attempting to dump a filesystem from a RHEL5 Linux server to a VXFS filesystem on an HP-UX server. The VXFS filesystem is large file enabled and I've confirmed that I can copy/scp a file >2GB to the filesystem. # fsadm -F vxfs /os_dumps largefiles # mkfs -F vxfs -m... (12 Replies)
Discussion started by: bkimura
12 Replies

10. Shell Programming and Scripting

Transfer the logs being thrown into /var/log/messages into another file example /var/log/volumelog

I have been searching and reading about syslog. I would like to know how to Transfer the logs being thrown into /var/log/messages into another file example /var/log/volumelog. tail -f /var/log/messages dblogger: msg_to_dbrow: no logtype using missing dblogger: msg_to_dbrow_str: val ==... (2 Replies)
Discussion started by: kenshinhimura
2 Replies
ARPTABLES(8)						      System Manager's Manual						      ARPTABLES(8)

NAME
arptables - ARP table administration SYNOPSIS
arptables [-t table] -[AD] chain rule-specification [options] arptables [-t table] -[RI] chain rulenum rule-specification [options] arptables [-t table] -D chain rulenum [options] arptables [-t table] -[LFZ] [chain] [options] arptables [-t table] -[NX] chain arptables [-t table] -E old-chain-name new-chain-name arptables [-t table] -P chain target [options] DESCRIPTION
arptables is a user space tool, it is used to set up and maintain the tables of ARP rules in the Linux kernel. These rules inspect the ARP frames which they see. arptables is analogous to the iptables user space tool, but arptables is less complicated. CHAINS The kernel table is used to divide functionality into different sets of rules. Each set of rules is called a chain. Each chain is an ordered list of rules that can match ARP frames. If a rule matches an ARP frame, then a processing specification tells what to do with that matching frame. The processing specification is called a 'target'. However, if the frame does not match the current rule in the chain, then the next rule in the chain is examined and so forth. The user can create new (user-defined) chains which can be used as the 'target' of a rule. TARGETS A firewall rule specifies criteria for an ARP frame and a frame processing specification called a target. When a frame matches a rule, then the next action performed by the kernel is specified by the target. The target can be one of these values: ACCEPT, DROP, CONTINUE, RETURN, an 'extension' (see below) or a user-defined chain. ACCEPT means to let the frame through. DROP means the frame has to be dropped. CONTINUE means the next rule has to be checked. This can be handy to know how many frames pass a certain point in the chain or to log those frames. RETURN means stop traversing this chain and resume at the next rule in the previous (calling) chain. For the extension targets please see the TARGET EXTENSIONS section of this man page. TABLES There is only one ARP table in the Linux kernel. The table is filter. You can drop the '-t filter' argument to the arptables command. The -t argument must be the first argument on the arptables command line, if used. -t, --table filter, is the only table and contains two (Linux kernels 2.4.X) or three (Linux kernels 2.6.0 and later) built-in chains: INPUT (for frames destined for the host), OUTPUT (for locally-generated frames) and FORWARD (for frames being forwarded by the bridge code). The FORWARD chain doesn't exist in Linux 2.4.X kernels. ARPTABLES COMMAND LINE ARGUMENTS
After the initial arptables command line argument, the remaining arguments can be divided into several different groups. These groups are commands, miscellaneous commands, rule-specifications, match-extensions, and watcher-extensions. COMMANDS The arptables command arguments specify the actions to perform on the table defined with the -t argument. If you do not use the -t argu- ment to name a table, the commands apply to the default filter table. With the exception of the -Z command, only one command may be used on the command line at a time. -A, --append Append a rule to the end of the selected chain. -D, --delete Delete the specified rule from the selected chain. There are two ways to use this command. The first is by specifying an interval of rule numbers to delete, syntax: start_nr[:end_nr]. Using negative numbers is allowed, for more details about using negative numbers, see the -I command. The second usage is by specifying the complete rule as it would have been specified when it was added. -I, --insert Insert the specified rule into the selected chain at the specified rule number. If the current number of rules equals N, then the specified number can be between -N and N+1. For a positive number i, it holds that i and i-N-1 specify the same place in the chain where the rule should be inserted. The number 0 specifies the place past the last rule in the chain and using this number is there- fore equivalent with using the -A command. -R, --replace Replaces the specified rule into the selected chain at the specified rule number. If the current number of rules equals N, then the specified number can be between 1 and N. i specifies the place in the chain where the rule should be replaced. -P, --policy Set the policy for the chain to the given target. The policy can be ACCEPT, DROP or RETURN. -F, --flush Flush the selected chain. If no chain is selected, then every chain will be flushed. Flushing the chain does not change the policy of the chain, however. -Z, --zero Set the counters of the selected chain to zero. If no chain is selected, all the counters are set to zero. The -Z command can be used in conjunction with the -L command. When both the -Z and -L commands are used together in this way, the rule counters are printed on the screen before they are set to zero. -L, --list List all rules in the selected chain. If no chain is selected, all chains are listed. -N, --new-chain Create a new user-defined chain with the given name. The number of user-defined chains is unlimited. A user-defined chain name has maximum length of 31 characters. -X, --delete-chain Delete the specified user-defined chain. There must be no remaining references to the specified chain, otherwise arptables will refuse to delete it. If no chain is specified, all user-defined chains that aren't referenced will be removed. -E, --rename-chain Rename the specified chain to a new name. Besides renaming a user-defined chain, you may rename a standard chain name to a name that suits your taste. For example, if you like PREBRIDGING more than PREROUTING, then you can use the -E command to rename the PRE- ROUTING chain. If you do rename one of the standard arptables chain names, please be sure to mention this fact should you post a question on the arptables mailing lists. It would be wise to use the standard name in your post. Renaming a standard arptables chain in this fashion has no effect on the structure or function of the arptables kernel table. MISCELLANOUS COMMANDS -V, --version Show the version of the arptables userspace program. -h, --help Give a brief description of the command syntax. -j, --jump target The target of the rule. This is one of the following values: ACCEPT, DROP, CONTINUE, RETURN, a target extension (see TARGET EXTEN- SIONS) or a user-defined chain name. RULE-SPECIFICATIONS The following command line arguments make up a rule specification (as used in the add and delete commands). A "!" option before the speci- fication inverts the test for that specification. Apart from these standard rule specifications there are some other command line arguments of interest. -s, --source-ip [!] address[/mask] The Source IP specification. -d, --destination-ip [!] address[/mask] The Destination IP specification. --source-mac [!] address[/mask] The source mac address. Both mask and address are written as 6 hexadecimal numbers separated by colons. --destination-mac [!] address[/mask] The destination mac address. Both mask and address are written as 6 hexadecimal numbers separated by colons. -i, --in-interface [!] name The interface via which a frame is received (for the INPUT and FORWARD chains). The flag --in-if is an alias for this option. -o, --out-interface [!] name The interface via which a frame is going to be sent (for the OUTPUT and FORWARD chains). The flag --out-if is an alias for this option. -l, --h-length length[/mask] The hardware length (nr of bytes) --opcode code[/mask] The operation code (2 bytes). Available values are: 1=Request 2=Reply 3=Request_Reverse 4=Reply_Reverse 5=DRARP_Request 6=DRARP_Reply 7=DRARP_Error 8=InARP_Request 9=ARP_NAK. --h-type type[/mask] The hardware type (2 bytes, hexadecimal). Available values are: 1=Ethernet. --proto-type type[/mask] The protocol type (2 bytes). Available values are: 0x800=IPv4. TARGET-EXTENSIONS arptables extensions are precompiled into the userspace tool. So there is no need to explicitly load them with a -m option like in ipta- bles. However, these extensions deal with functionality supported by supplemental kernel modules. mangle --mangle-ip-s IP address Mangles Source IP Address to given value. --mangle-ip-d IP address Mangles Destination IP Address to given value. --mangle-mac-s MAC address Mangles Source MAC Address to given value. --mangle-mac-d MAC address Mangles Destination MAC Address to given value. --mangle-target target Target of ARP mangle operation (DROP, CONTINUE or ACCEPT -- default is ACCEPT). CLASSIFY This module allows you to set the skb->priority value (and thus clas- sify the packet into a specific CBQ class). --set-class major:minor Set the major and minor class value. The values are always interpreted as hexadecimal even if no 0x prefix is given. MAILINGLISTS
See http://netfilter.org/mailinglists.html SEE ALSO
iptables(8), ebtables(8), arp(8), rarp(8), ifconfig(8), route(8) See http://ebtables.sf.net November 2011 ARPTABLES(8)
All times are GMT -4. The time now is 12:53 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy