Submit
Path:
~
/
/
usr
/
share
/
doc
/
fail2ban
/
dist-config
/
action.d
/
File Content:
mikrotik.conf
# Fail2Ban configuration file # # Mikrotik routerOS action to add/remove address-list entries # # Author: Duncan Bellamy <dunk@denkimushi.com> # based on forum.mikrotik.com post by pakjebakmeel # # in the instructions: # (10.0.0.1 is ip of mikrotik router) # (10.0.0.2 is ip of fail2ban machine) # # on fail2ban machine: # sudo mkdir /var/lib/fail2ban/ssh # sudo chmod 700 /var/lib/fail2ban/ssh # sudo ssh-keygen -N "" -f /var/lib/fail2ban/ssh/fail2ban_id_rsa # sudo scp /var/lib/fail2ban/ssh/fail2ban_id_rsa.pub admin@10.0.0.1:/ # ssh admin@10.0.0.1 # # on mikrotik router: # /user add name=miki-f2b group=write address=10.0.0.2 password="" # /user ssh-keys import public-key-file=fail2ban_id_rsa.pub user=miki-f2b # /quit # # on fail2ban machine: # (check password login fails) # ssh miki-f2b@10.0.0.1 # (check private key works) # sudo ssh -i /var/lib/fail2ban/ssh/fail2ban_id_rsa miki-f2b@10.0.0.1 # # Then create rules on mikrorik router that use address # list(s) maintained by fail2ban eg in the forward chain # drop from address list, or in the forward chain drop # from address list to server # # example extract from jail.local overriding some defaults # action = mikrotik[keyfile="%(mkeyfile)s", user="%(muser)s", host="%(mhost)s", list="%(mlist)s"] # # ignoreip = 127.0.0.1/8 192.168.0.0/24 # mkeyfile = /etc/fail2ban/ssh/mykey_id_rsa # muser = myuser # mhost = 192.168.0.1 # mlist = BAD LIST [Definition] actionstart = actionstop = %(actionflush)s actionflush = %(command)s "/ip firewall address-list remove [find list=\"%(list)s\" comment~\"%(startcomment)s-*\"]" actioncheck = actionban = %(command)s "/ip firewall address-list add list=\"%(list)s\" address=<ip> comment=%(comment)s" actionunban = %(command)s "/ip firewall address-list remove [find list=\"%(list)s\" comment=%(comment)s]" command = ssh -l %(user)s -p%(port)s -i %(keyfile)s %(host)s # Option: user # Notes.: username to use when connecting to routerOS user = # Option: port # Notes.: port to use when connecting to routerOS port = 22 # Option: keyfile # Notes.: ssh private key to use for connecting to routerOS keyfile = # Option: host # Notes.: hostname or ip of router host = # Option: list # Notes.: name of "address-list" to use on router list = Fail2Ban # Option: startcomment # Notes.: used as a prefix to all comments, and used to match for flushing rules startcomment = f2b-<name> # Option: comment # Notes.: comment to use on routerOS (must be unique as used for ip address removal) comment = %(startcomment)s-<ip> [Init] name="%(__name__)s"
Edit
Rename
Chmod
Delete
FILE
FOLDER
INFO
Name
Size
Permission
Action
abuseipdb.conf
3748 bytes
0644
apf.conf
587 bytes
0644
apprise.conf
1413 bytes
0644
blocklist_de.conf
2715 bytes
0644
bsd-ipfw.conf
3226 bytes
0644
cloudflare-token.conf
3072 bytes
0644
cloudflare.conf
3037 bytes
0644
complain.conf
4773 bytes
0644
dshield.conf
7684 bytes
0644
dummy.conf
1717 bytes
0644
firewallcmd-allports.conf
1501 bytes
0644
firewallcmd-common.conf
2649 bytes
0644
firewallcmd-ipset.conf
3928 bytes
0644
firewallcmd-multiport.conf
1270 bytes
0644
firewallcmd-new.conf
1898 bytes
0644
firewallcmd-rich-logging.conf
1021 bytes
0644
firewallcmd-rich-rules.conf
1753 bytes
0644
helpers-common.conf
592 bytes
0644
hostsdeny.conf
1657 bytes
0644
ipfilter.conf
1573 bytes
0644
ipfw.conf
1505 bytes
0644
iptables-allports.conf
291 bytes
0644
iptables-ipset-proto4.conf
2221 bytes
0644
iptables-ipset-proto6-allports.conf
814 bytes
0644
iptables-ipset-proto6.conf
773 bytes
0644
iptables-ipset.conf
2810 bytes
0644
iptables-multiport-log.conf
2163 bytes
0644
iptables-multiport.conf
232 bytes
0644
iptables-new.conf
332 bytes
0644
iptables-xt_recent-echo.conf
2842 bytes
0644
iptables.conf
4791 bytes
0644
ipthreat.conf
4291 bytes
0644
mail-buffered.conf
2495 bytes
0644
mail-whois-common.conf
1051 bytes
0644
mail-whois-lines.conf
2459 bytes
0644
mail-whois.conf
1890 bytes
0644
mail.conf
1757 bytes
0644
mikrotik.conf
2546 bytes
0644
mynetwatchman.conf
5321 bytes
0644
netscaler.conf
1493 bytes
0644
nftables-allports.conf
383 bytes
0644
nftables-multiport.conf
384 bytes
0644
nftables.conf
6317 bytes
0644
nginx-block-map.conf
4010 bytes
0644
npf.conf
1524 bytes
0644
nsupdate.conf
3234 bytes
0644
osx-afctl.conf
497 bytes
0644
osx-ipfw.conf
2302 bytes
0644
pf.conf
4082 bytes
0644
route.conf
1023 bytes
0644
sendmail-buffered.conf
2806 bytes
0644
sendmail-common.conf
1939 bytes
0644
sendmail-geoip-lines.conf
1761 bytes
0644
sendmail-whois-ipjailmatches.conf
1055 bytes
0644
sendmail-whois-ipmatches.conf
1036 bytes
0644
sendmail-whois-lines.conf
1299 bytes
0644
sendmail-whois-matches.conf
1000 bytes
0644
sendmail-whois.conf
950 bytes
0644
sendmail.conf
829 bytes
0644
shorewall-ipset-proto6.conf
3762 bytes
0644
shorewall.conf
2156 bytes
0644
smtp.py
6655 bytes
0644
symbiosis-blacklist-allports.conf
1503 bytes
0644
ufw.conf
2379 bytes
0644
xarf-login-attack.conf
6443 bytes
0644
N4ST4R_ID | Naxtarrr