Re: [pfSense Support] Brute Force

2008-09-02 Thread Jeppe Øland
What I did was simply set the firewall rule advanced settings. Here I set "2 Maximum new connections / 60 seconds". Looking at the rule, I'm not sure if it checks for multiple connections from the same host, or just for multiple connections in general. Technically I guess this means that a malicio

Re: [pfSense Support] openvpn and road warrior issues

2008-09-02 Thread BSD Wiz
i changed both the client and server to tcp and it looks like similiar errors. here is part of the client logs... Sep 3 00:54:22 UNIXBOX openvpn[4112]: Local Options String: 'V4,dev- type tun,link-mtu 1543,tun-mtu 1500,proto TCPv4_CLIENT,cipher BF- CBC,auth SHA1,keysize 128,key-method 2,tls

[pfSense Support] openvpn and road warrior issues

2008-09-02 Thread BSD Wiz
hi, i'm trying to get openvpn running on pfsense 1.2 working with tunnelblick on my macbook. the link below shows my server config, client config, and client log file. any suggestions are appreciated. http://pastebin.com/d50a50091 thanks, -phil ---

Re: [pfSense Support] Brute Force

2008-09-02 Thread Aliet Santiesteban Sifontes
I'm interesting in this solution, can you explain hoy you did this?? best regards 2008/8/31, Jeppe Øland <[EMAIL PROTECTED]>: > Hi, > > I just set up the firewall hole for SSH to block if more than a few > connections were made from the same host within a minute or so. > All the brute-force attack