Lockdown access to only “allowed” jump boxes . That way every ssh connections 
are blocked immediately , and only permitted boxes are allowed . 

Watz.
On 12/20/17, 3:01 PM, "List on behalf of Daniel" 
<list-boun...@lists.pfsense.org on behalf of dan...@linux-nerd.de> wrote:

    I mean not on the pfsense itself.
    
    I mean my network behind my pfsense which nicht not connected via NAT
    
    
    Am 20.12.17, 13:27 schrieb "List im Auftrag von Maikel van Leeuwen" 
<list-boun...@lists.pfsense.org im Auftrag von maikel.van.leeu...@sentia.com>:
    
        
https://www.reddit.com/r/PFSENSE/comments/2xguy2/fail2ban_like_package/?st=jbf195y7&sh=d11a08b6
        
        
        
        Sentia logo <https://www.sentia.com>    
                
        *Maikel van Leeuwen*
        Continuity Engineer
        E-mail: maikel.van.leeu...@sentia.com 
<mailto:maikel.van.leeu...@sentia.com>
        Tel.: +31 (0)88 4242 206
        Preferred communication by e-mail
        
        *Sentia* / Einsteinbaan 4 - 3439 NJ Nieuwegein / MediArena 7 - 1114 BC 
        Amsterdam / Nederland
        *https://www.sentia.nl*
        
        This e-mail may contain information which is privileged or 
confidential. 
        If you received this e-mail in error, please notify us immediately by 
        e-mail or telephone and delete the e-mail without copying or disclosing 
        its contents to any other person.
        
        On 12/20/2017 01:25 PM, WebDawg wrote:
        > Also make sure to use private key and public key
        >
        > On Dec 20, 2017 5:53 AM, "Daniel" <dan...@linux-nerd.de> wrote:
        >
        >> Hi there,
        >>
        >>
        >>
        >> anyone now how to prevent SSH Bruteforce attackes in my network?
        >>
        >> I wanted to have a Firewall which counts SSH Connections from the 
same IP
        >> and when it reach the defined limit the IP will be block.
        >>
        >>
        >>
        >> I know I can change the SSH port but I also want to know is there is 
an
        >> option to limit such kind of attacks.
        >>
        >>
        >>
        >> Cheers
        >>
        >>
        >>
        >> Daniel
        >>
        >> _______________________________________________
        >> pfSense mailing list
        >> https://lists.pfsense.org/mailman/listinfo/list
        >> Support the project with Gold! https://pfsense.org/gold
        >>
        > _______________________________________________
        > pfSense mailing list
        > https://lists.pfsense.org/mailman/listinfo/list
        > Support the project with Gold! https://pfsense.org/gold
        
        _______________________________________________
        pfSense mailing list
        https://lists.pfsense.org/mailman/listinfo/list
        Support the project with Gold! https://pfsense.org/gold
        
    
    
    _______________________________________________
    pfSense mailing list
    https://lists.pfsense.org/mailman/listinfo/list
    Support the project with Gold! https://pfsense.org/gold
    

_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold

Reply via email to