{"id":3487,"date":"2023-06-10T14:26:27","date_gmt":"2023-06-10T11:26:27","guid":{"rendered":"https:\/\/www.virtono.com\/community\/?p=3487"},"modified":"2023-06-09T15:21:31","modified_gmt":"2023-06-09T12:21:31","slug":"how-to-install-and-configure-fail2ban-on-centos","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/","title":{"rendered":"How to Install and Configure fail2ban on CentOS"},"content":{"rendered":"\n<p>We&#8217;ll walk you through the step-by-step process of installing and configuring fail2ban on CentOS. By the end, you&#8217;ll have a robust defense mechanism in place to protect your server from unauthorized access attempts. In today&#8217;s interconnected world, security is of utmost importance, especially for servers and systems that are constantly exposed to various threats. One essential tool for enhancing the security of your CentOS server is fail2ban.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/#What_is_fail2ban\" title=\"What is fail2ban?\">What is fail2ban?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/#Prerequisites\" title=\"Prerequisites\">Prerequisites<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/#Install_Fail2ban_on_CentOS\" title=\"Install Fail2ban on CentOS\">Install Fail2ban on CentOS<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/#Step_1_Update_System_Packages\" title=\"Step 1: Update System Packages\">Step 1: Update System Packages<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/#Step_2_Install_fail2ban\" title=\"Step 2: Install fail2ban\">Step 2: Install fail2ban<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/#Fail2ban_Configuration\" title=\"Fail2ban Configuration\">Fail2ban Configuration<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/#Service_Management\" title=\"Service Management\">Service Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/#Monitoring_fail2ban\" title=\"Monitoring fail2ban\">Monitoring fail2ban<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/#Additional_Considerations\" title=\"Additional Considerations\">Additional Considerations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/#Final_Thoughts\" title=\"Final Thoughts\">Final Thoughts<\/a><\/li><\/ul><\/nav><\/div>\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"What_is_fail2ban\"><\/span>What is fail2ban?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Before diving into the installation and configuration process, let&#8217;s briefly understand what fail2ban is. Fail2ban is an open-source intrusion prevention software that works by monitoring log files for suspicious activity and taking proactive measures to block potential attackers. It scans log files in real-time, detects patterns of malicious behavior, and dynamically modifies the firewall rules to deny access to the attackers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Prerequisites\"><\/span>Prerequisites<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Before proceeding with the installation, ensure that you have:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>A <a href=\"https:\/\/virtono.com\/cloud-vps\" target=\"_blank\" rel=\"noopener\">CentOS server<\/a> (preferably CentOS 7 or higher) with root access.<\/li>\n\n\n\n<li>A basic understanding of the command line.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Install_Fail2ban_on_CentOS\"><\/span>Install Fail2ban on CentOS<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>To install fail2ban on CentOS, follow these steps:<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Step_1_Update_System_Packages\"><\/span>Step 1: Update System Packages<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Start by updating the system packages to their latest versions. Open the terminal and run the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background\"><code>sudo yum update<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Step_2_Install_fail2ban\"><\/span>Step 2: Install fail2ban<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Once the system is updated, you can proceed with installing fail2ban on CentOS. Enter the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background\"><code>sudo yum install epel-release\nsudo yum install fail2ban<\/code><\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"265\" data-attachment-id=\"3488\" data-permalink=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/attachment\/screenshot-2023-06-09-at-15-12-21\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.12.21.png?fit=1990%2C704&amp;ssl=1\" data-orig-size=\"1990,704\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screenshot-2023-06-09-at-15.12.21\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.12.21.png?fit=750%2C265&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.12.21.png?resize=750%2C265&#038;ssl=1\" alt=\"How to Install and Configure fail2ban on CentOS\" class=\"wp-image-3488\" srcset=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.12.21.png?resize=1024%2C362&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.12.21.png?resize=300%2C106&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.12.21.png?resize=768%2C272&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.12.21.png?resize=1536%2C543&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.12.21.png?w=1990&amp;ssl=1 1990w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Fail2ban_Configuration\"><\/span>Fail2ban Configuration<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>With fail2ban installed, it&#8217;s time to configure it according to your server&#8217;s needs. The configuration file for fail2ban is located at <code>\/etc\/fail2ban\/jail.conf<\/code>. However, it is recommended to create a separate configuration file to avoid overriding changes during package upgrades. Here&#8217;s how you can do it:<\/p>\n\n\n\n<p><strong>Copy the Configuration File<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background\"><code>sudo cp \/etc\/fail2ban\/jail.conf \/etc\/fail2ban\/jail.local<\/code><\/pre>\n\n\n\n<p><strong>Edit the Configuration File<\/strong><\/p>\n\n\n\n<p>Open the newly created configuration file <code>\/etc\/fail2ban\/jail.local<\/code> using your preferred text editor. This file contains various configuration options to customize fail2ban&#8217;s behavior. Some important settings to consider are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>ignoreip<\/code>: Defines IP addresses that should be ignored by fail2ban.<\/li>\n\n\n\n<li><code>bantime<\/code>: Specifies the duration (in seconds) an IP address should be banned.<\/li>\n\n\n\n<li><code>maxretry<\/code>: Sets the maximum number of login attempts before an IP address is banned.<\/li>\n<\/ul>\n\n\n\n<p>Make the necessary changes based on your requirements, and save the file.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Service_Management\"><\/span>Service Management<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Now that fail2ban on CentOS is installed and configured, it&#8217;s time to start and enable the service. Follow these steps:<\/p>\n\n\n\n<p><strong>Start the fail2ban on CentOS<\/strong> <strong>Service<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background\"><code>sudo systemctl start fail2ban<\/code><\/pre>\n\n\n\n<p><strong>Enable fail2ban on Boot<\/strong><\/p>\n\n\n\n<p>To ensure that fail2ban starts automatically on system boot, run the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background\"><code>sudo systemctl enable fail2ban<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Monitoring_fail2ban\"><\/span>Monitoring fail2ban<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>To monitor the status of fail2ban and view banned IP addresses, you can use the following commands:<\/p>\n\n\n\n<p><strong>To check the status of fail2ban:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background\"><code>sudo systemctl status fail2ban<\/code><\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"239\" data-attachment-id=\"3489\" data-permalink=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/attachment\/screenshot-2023-06-09-at-15-14-30\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.14.30.png?fit=2088%2C664&amp;ssl=1\" data-orig-size=\"2088,664\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screenshot-2023-06-09-at-15.14.30\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.14.30.png?fit=750%2C239&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.14.30.png?resize=750%2C239&#038;ssl=1\" alt=\"Configure fail2ban on CentOS\" class=\"wp-image-3489\" srcset=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.14.30.png?resize=1024%2C326&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.14.30.png?resize=300%2C95&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.14.30.png?resize=768%2C244&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.14.30.png?resize=1536%2C488&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-09-at-15.14.30.png?resize=2048%2C651&amp;ssl=1 2048w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>To view the currently banned IP addresses:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background\"><code>sudo fail2ban-client status\nStatus\n|- Number of jail:\t0\n`- Jail list:\t<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Additional_Considerations\"><\/span>Additional Considerations<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>While fail2ban provides excellent protection against various types of attacks, it&#8217;s essential to keep a few things in mind:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Regularly update fail2ban to benefit from the latest security enhancements.<\/li>\n\n\n\n<li>Periodically review the log files and adjust fail2ban&#8217;s configuration as necessary.<\/li>\n\n\n\n<li>Ensure that your server&#8217;s time and timezone are correctly configured to avoid potential issues with fail2ban&#8217;s ban time calculations.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Final_Thoughts\"><\/span>Final Thoughts<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>By installing and configuring fail2ban on your CentOS server, you have taken a significant step towards bolstering its <a href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-csf-config-server-firewall-on-centos-7\/\">security<\/a>. fail2ban&#8217;s ability to detect and block suspicious activities will mitigate the risk of unauthorized access attempts. Remember to stay vigilant, keep your system up to date, and adapt fail2ban&#8217;s configuration as needed to ensure continuous protection against potential threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ll walk you through the step-by-step process of installing and configuring fail2ban on CentOS. By the end, you&#8217;ll have a robust defense mechanism in place to protect your server from unauthorized access attempts. In today&#8217;s interconnected world, security is of utmost importance, especially for servers and systems that are constantly<\/p>\n","protected":false},"author":8,"featured_media":3490,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[3],"tags":[489,492,488,490,487,491],"class_list":["post-3487","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorial-how-to","tag-configure-fail2ban","tag-fail2ban-centos","tag-fail2ban-on-centos","tag-how-to-configure-fail2ban","tag-how-to-install-fail2ban","tag-install-fail2ban"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Install-and-Configure-fail2ban-on-CentOS.png?fit=600%2C330&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-Uf","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":542,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/542\/","url_meta":{"origin":3487,"position":0},"title":"HOW TO INSTALL AND SET UP FAIL2BAN ON CENTOS SERVER","author":"Daniel Draga","date":"August 26, 2016","format":false,"excerpt":"Fail2ban software is an intrusion prevention framework on your CentOS 7 (and 6) vps that scans log files and bans IPs that show the malicious signs so you can protect your server from brute-force attacks. Some previously posted some including to change default SSH port and to disable root login\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/08\/fail2ban.jpg?fit=784%2C313&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/08\/fail2ban.jpg?fit=784%2C313&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/08\/fail2ban.jpg?fit=784%2C313&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/08\/fail2ban.jpg?fit=784%2C313&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1149,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/ssh-login-under-debian-with-fail2ban\/","url_meta":{"origin":3487,"position":1},"title":"SSH Login under Debian with fail2ban","author":"Shreyash Sharma","date":"October 22, 2017","format":false,"excerpt":"The tool\u00a0fail2ban\u00a0,\u00a0written in Python,\u00a0aims to secure server services against DoS attacks.\u00a0It checks log files for predefined patterns and temporarily blocks the corresponding IP addresses if the failed access is repeated.\u00a0This article shows you how to back up a Debian-based server with fail2ban.\u00a0The deployed version of fail2ban is\u00a00.9.6-2\u00a0under\u00a0Debian 9.1\u00a0. Problem In\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/fail2ban-logo2.png?fit=459%2C441&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3595,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/how-to-protect-your-server-against-brute-force-attacks\/","url_meta":{"origin":3487,"position":2},"title":"How to Protect Your Server Against Brute Force Attacks","author":"George B.","date":"June 23, 2023","format":false,"excerpt":"Introduction Brute force attacks are one of the most common threats that server administrators face. This guide is designed to provide you with the knowledge and strategies you need to protect your server from brute force attacks. What is a Server Brute Force Attack A server brute force attack is\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1156,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/ssh-root-forbid-login-under-debian\/","url_meta":{"origin":3487,"position":3},"title":"SSH root forbid login under Debian","author":"Shreyash Sharma","date":"October 23, 2017","format":false,"excerpt":"If you want to ban direct SSH root login on Debian, you need at least one additional user who can log on to the server, in addition to the root user.\u00a0Use this user to change to the root account. ATTENTION:\u00a0If you have not created another user, you lock yourself out\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/ssh_installer_2.jpg?fit=638%2C478&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/ssh_installer_2.jpg?fit=638%2C478&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/ssh_installer_2.jpg?fit=638%2C478&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2836,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-plesk-on-ubuntu-20-04\/","url_meta":{"origin":3487,"position":4},"title":"How to Install Plesk on Ubuntu 20.04","author":"George B.","date":"July 18, 2022","format":false,"excerpt":"What is Plesk? Plesk is a commercial web hosting and server data center automation software developed for Linux and Windows-based retail hosting service providers. Plesk Minimum Requirements The minimum amount of RAM required for installing and running Plesk on Linux is 1 GB + 1 GB swap. On Windows \u2013\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/1200px-Logo_Plesk.svg_.png?fit=1200%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/1200px-Logo_Plesk.svg_.png?fit=1200%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/1200px-Logo_Plesk.svg_.png?fit=1200%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/1200px-Logo_Plesk.svg_.png?fit=1200%2C1200&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/1200px-Logo_Plesk.svg_.png?fit=1200%2C1200&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3264,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-ansible-on-centos\/","url_meta":{"origin":3487,"position":5},"title":"How to install Ansible on CentOS","author":"George B.","date":"April 18, 2023","format":false,"excerpt":"In this article, we will discuss how to install Ansible on CentOS, one of the most popular Linux distributions used in server environments. Ansible is a powerful automation tool that can be used to manage configurations, deploy applications, and perform various administrative tasks on remote servers. Step 1: Update Your\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/How-To-Install-Ansible-CentOS.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/How-To-Install-Ansible-CentOS.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/How-To-Install-Ansible-CentOS.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/3487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=3487"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/3487\/revisions"}],"predecessor-version":[{"id":3491,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/3487\/revisions\/3491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/3490"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=3487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=3487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=3487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}