<p dir="ltr">Have you looked at fail2ban? I use it to block IPs that create excessive err log entries for x minutes. I also watch for specific naughty requests like phpmyadmin and block forever.</p>
<p dir="ltr">Sonicwall is exceptionally poor.</p>
<div class="gmail_quote">On Mar 18, 2013 2:20 PM, "J. Wade Michaelis" <<a href="mailto:jwade@userfriendlytech.net">jwade@userfriendlytech.net</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div>I have a CentOS web server that has recently been brought to a halt on two separate occasions. Checking the access.log, it appears that it was a Denial of Service (DOS) attack (hundreds of HTTP requests in a very short time, all from a single IP address).</div>
<div><br></div><div>I want to prevent these types of attacks from bringing the server to its knees. We have a hardware firewall (SonicWall) in place, but it isn't quite new enough to run the firmware that allows rate-limiting.</div>
<div><br></div><div>I have found a number of tutorials that show how to do this type of thing with IPTABLES. Is there a better solution? </div><div><br></div><div>Supposing I go with IPTABLES, do I need to include rules to allow FTP and SSH (the only other services on the server)? </div>
<div><br></div><div>Would any of you be willing to assist me with this?</div><br clear="all"><div>Thanks,<br>~ j.<br><a href="mailto:jwade@userfriendlytech.net" target="_blank">jwade@userfriendlytech.net</a></div>
<br>_______________________________________________<br>
KCLUG mailing list<br>
<a href="mailto:KCLUG@kclug.org">KCLUG@kclug.org</a><br>
<a href="http://kclug.org/mailman/listinfo/kclug" target="_blank">http://kclug.org/mailman/listinfo/kclug</a><br></blockquote></div>