for nearly a week now ip 61.238.158.21 originating from Hong Kong has been hammering a sip attack on my pbx, I have created the following packet rule but I don't see the ip being blocked by packet rule, just shows "default drop" which is filling up my logs fast, that's why I know with the pf rule I can instruct it too not log traffic. Here is the PF rule I created:
Position 1
Source: host 61.238.158.21
service: any
Destination: any
any ideas??
Derek "Astaro newbie"
This thread was automatically locked due to age.