Fernando,

Rather than enabling the "ssh brute force" plugin, I would enable the "adaptive 
ban" plugin (functions like fail2ban).  Set the plugin config...

ADAPTIVE_BAN_TYPES="sshd asterisk"

most the the other defaults should be good.

Lonnie


On Sep 21, 2011, at 8:41 AM, Fernando Fuentes wrote:

> Lonnie,
> 
> What would be the best way to secure my astlinux setup? I have iptables setup 
> with ssh brute force module enabled.
> Though the only port really open to the out side are sip, rtp, and iax2. is 
> there a way to really secure this port without affecting asterisk?
> 
> Thank You,
> 
> 
> On Tue, Sep 20, 2011 at 11:00 PM, Fernando Fuentes <digitaldis...@gmail.com> 
> wrote:
> Lonnie,
> 
> It was all set correct and with the user variable is all working now.
> Thank you very much!
> 
> 
> On Tue, Sep 20, 2011 at 10:29 PM, Lonnie Abelbeck <li...@lonnie.abelbeck.com> 
> wrote:
> 
> On Sep 20, 2011, at 9:56 PM, Fernando Fuentes wrote:
> 
> > Lonnie,
> >
> > Thank you very much its all working now.
> >
> > I do have one more question (all welcome to pitch in ideas).
> >
> > How can I change the send email information?
> > For example my mail server provider is not accepting the emails because it 
> > has an invalid domain and user "in this case root" how can I change it 
> > where it uses my hosting domain and a more likable user as to from like 
> > astli...@mydomain.com
> 
> In the Network tab (web interface) there is the section, "Outbound SMTP Mail 
> Relay:", is that all proper?  Is "SMTP Domain:" defined?
> 
> If that all looks fine, you can also set the SMTP_FROM  variable via Network 
> tab -> User System Variables: { Edit User Variables }
> #--
> SMTP_FROM="u...@myhost.tld"
> #--
> this is not usually needed, but it is an advanced configuration variable.
> 
> Lonnie
> 
> 
> ------------------------------------------------------------------------------
> All the data continuously generated in your IT infrastructure contains a
> definitive record of customers, application performance, security
> threats, fraudulent activity and more. Splunk takes this data and makes
> sense of it. Business sense. IT sense. Common sense.
> http://p.sf.net/sfu/splunk-d2dcopy1
> _______________________________________________
> Astlinux-users mailing list
> Astlinux-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/astlinux-users
> 
> Donations to support AstLinux are graciously accepted via PayPal to 
> pay...@krisk.org.
> 
> 
> ------------------------------------------------------------------------------
> All the data continuously generated in your IT infrastructure contains a
> definitive record of customers, application performance, security
> threats, fraudulent activity and more. Splunk takes this data and makes
> sense of it. Business sense. IT sense. Common sense.
> http://p.sf.net/sfu/splunk-d2dcopy1_______________________________________________
> Astlinux-users mailing list
> Astlinux-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/astlinux-users
> 
> Donations to support AstLinux are graciously accepted via PayPal to 
> pay...@krisk.org.


------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Astlinux-users mailing list
Astlinux-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/astlinux-users

Donations to support AstLinux are graciously accepted via PayPal to 
pay...@krisk.org.

Reply via email to