This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How to block SSH scans with IPS

I have created a new rule set and added everything that matches SSH but still I do see people trying my SSH server:

Nov 12 10:18:34 bananapi root: DENY sshd connection from 193.33.8.98 (PL)
Nov 12 10:18:34 bananapi sshd[32506]: aclexec returned 1
Nov 12 10:18:34 bananapi sshd[32506]: refused connect from 193.33.8.98 (193.33.8.98)

I have the following rule set for the SSH port forward firewall rule:



How can I block SSH scan attempts or why are scan attempts continuing through the IPS rules?



This thread was automatically locked due to age.
Parents Reply
  • Ok, the 17.5 beta version had a SSH brute force protection rule but now 2 hours later the rule has disappeared (perhahs after the pattern update?).

    The Snort rules you're referring to are not usefull for Sophos XG so the next help is to propose a KB article dedicated how to create a custom rule?

Children