Hi

I have rules like this one on the firewalls I manage:

pass in on $in_if proto tcp from any to <sshservers> port ssh \
        flags S/SA keep state \
        (source-track rule, max-src-states 30, max-src-conn 20, \
        max-src-conn-rate 15/30, overload <ssh-bruteforce> flush
        global)

block log from <ssh-bruteforce>

However some legitimate remote users get their addresses added to the
ssh-bruteforce table from time to time.

I'd like to be able to figure out the reason (ie which condtion
triggers the overload). Is there a way to have it logged somewhere
that I'm missing ?

Thanks in avance,
-- 
Matthieu Herrb

Reply via email to