RBMTX-Lite banIP
The banIP page of RBMTX-Lite router is used to configure banIP package to block ip addresses/subnets via IPSet.
Overview
Information
banIP package details can be found in Information section. You can refresh timer, suspend, refresh or restart the package using the corresponding buttons.
| Name | Value | Description |
|---|---|---|
| Status / Version | Package status and version | |
| IPSet Information | ||
| Active Sources | ||
| Active Devices | ||
| Active Interfaces | ||
| Active Logterms | ||
| Active Subnets | ||
| Run Information | ||
| Run Flags | ||
| Last Run |
Settings
General Settings
| Name | Value | Description |
|---|---|---|
| Enabled | On/Off, default: Off | Enable the banIP service. |
| Startup Trigger Interface | unspecified, dhcp, gsm or lan, default: gsm | List of available network interfaces to trigger the banIP start. |
| Auto Detection | On/Off, default: On | Detect relevant network interfaces, devices, subnets and protocols automatically. |
| Log Monitor | On/Off, default: Off | Starts a small log monitor in the background to block suspicious SSH/LuCI login attempts. |
| Enable SRC logging | On/Off, default: On | Log suspicious incoming packets - usually dropped. |
| Enable DST logging | On/Off, default: Off | Log suspicious outgoing packets - usually rejected. Logging such packets may cause an increase in latency due to it requiring additional system resources. |
| Whitelist Only | On/Off, default: Off | Restrict the internet access from/to a small number of secure websites/IPs and block access from/to the rest of the internet. |
| E-Mail Notification | On/Off, default: Off | Send banIP related notification e-mails. This needs the installation and setup of the additional 'msmtp' package. |
Additional Settings
| Name | Value | Description |
|---|---|---|
| Verbose Debug Logging | On/Off, default: Off | Enable verbose debug logging in case of any processing errors. |
| Service Priority | Highest Priority, High Priority, Normal Priority, Less Priority or Least Priority, default: Normal Priority | The selected priority will be used for banIP background processing. This change requires a full banIP service restart to take effect. |
| Trigger Delay | range from 1 to 120, default: 5 | Additional trigger delay in seconds before banIP processing begins. |
| Download Queue | 1, 2, 4, 8, 16 or 32, default: 4 | Size of the download queue for download processing in parallel. |
| Base Temp Directory | Base Temp Directory used for all banIP related runtime operations. | |
| Backup Directory | Target directory for compressed source list backups. | |
| Report Directory | Target directory for IPSet related report files. | |
| Download Utility | uclient-fetch, wget, curl or aria2c, default: none | List of supported and fully pre-configured download utilities. |
| Download Insecure | On/Off, default: Off | Don't check SSL server certificates during download. |
| Download Parameters | Manually override the pre-configured download options for the selected download utility. |
Advanced Chain Settings
Advanced Chain Settings tab is divided into three parts: Individual IPSet Settings, IPv4 Chains and IPv6 Chains which are described in the table below. Note: Changes on this tab needs a full banIP service restart to take effect.
| Name | Value | Description |
|---|---|---|
| Global IPSet Type | src_dst, src or dst, default: src+dst | Set the global IPset type default, to block incoming (SRC) and/or outgoing (DST) packets. |
| SRC Target | DROP or REJECT, default: DROP | Set the firewall target for all SRC related rules. |
| DST Target | REJECT or DROP, default: REJECT | Set the firewall target for all DST related rules. |
| Maclist Timeout | 30 minutes, 1 hour, 6 hours, 12 hours or 24 hours, default: none | Set the maclist IPSet timeout. |
| Whitelist Timeout | 30 minutes, 1 hour, 6 hours, 12 hours or 24 hours, default: none | Set the whitelist IPSet timeout. |
| Blacklist Timeout | 30 minutes, 1 hour, 6 hours, 12 hours or 24 hours, default: none | Set the blacklist IPSet timeout. |
| SRC IPSet Type | Set individual SRC type per IPset to block only incoming packets. | |
| DST IPSet Type | Set individual DST type per IPset to block only outgoing packets. | |
| SRC+DST IPSet Type | Set individual SRC+DST type per IPset to block incoming and outgoing packets. | |
| LAN Input (IPv4 Chains) | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_lan_rule'. | |
| LAN Forward | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_lan_rule'. | |
| WAN Input | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_wan_rule'. | |
| WAN Forward | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_wan_rule'. | |
| LAN Input (IPv6 Chains) | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_lan_rule'. | |
| LAN Forward | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_lan_rule'. | |
| WAN Input | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_wan_rule'. | |
| WAN Forward | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_wan_rule'. |
Advanced Log Settings
Note: Changes on this tab needs a full banIP service restart to take effect.
| Name | Value | Description |
|---|---|---|
| Log Limit | 50, 100, 250 or 500, default: 100 | Parse only the last stated number of log entries for suspicious events. |
| Log Terms | dropbear, sshd, luci or nginx, default: none | Limit the log monitor to certain log terms. |
| SSH Log Count | range from 1 to 10, default: 3 | Number of failed ssh login repetitions of the same ip in the log before banning. |
| LuCI Log Count | range from 1 to 10, default: 3 | Number of failed LuCI login repetitions of the same ip in the log before banning. |
| NGINX Log Count | range from 1 to 20, default: 5 | Number of failed nginx requests of the same ip in the log before banning. |
| SRC Log Options | -m limit --limit 2/sec (default), -m limit --limit 10/sec or custom, default: none | Set special SRC log options, e.g. to set a limit rate. |
| DST Log Options | -m limit --limit 2/sec (default), -m limit --limit 10/sec or custom, default: none | Set special DST log options, e.g. to set a limit rate. |
Advanced E-Mail Settings
| Name | Value | Description |
|---|---|---|
| E-Mail Sender Address | Sender address for banIP notification E-Mails. | |
| E-Mail Topic | string | Topic for banIP notification E-Mails. |
| E-Mail Profile | string | Profile used by 'msmtp' for banIP notification E-Mails. |
| E-Mail Actions | start, reload, restart or refresh, default: none | Limit E-Mail trigger to certain banIP actions. |
Blocklist Sources
In Blocklist Sources tab user can manage supported and fully pre-configured banIP sources. Section is divided into three parts: Country Selection, ASN Selection and Local Sources which are described in the table below.
| Name | Value | Description |
|---|---|---|
| Countries | ||
| ASNs | ||
| Local Sources | ||
| Extra Sources | ||
| Auto Blacklist | ||
| Auto Whitelist |
IPSet Report
This tab shows the last generated IPSet Report. Press the Refresh button to get a current one. To Search the active banIP-related IPSets for a specific IP, CIDR or MAC address press IPSet Querry button.
| Name | Value | Description |
|---|---|---|
| Timestamp | ||
| Number of all IPSets | number | |
| Number of all entries | number | |
| Number of IP entries | number | |
| Number of CIDR entries | number | |
| Number of MAC entries | number | |
| Number of accessed entries | number |
Edit Blacklist
This is the local banIP blacklist to always-deny certain IP/CIDR addresses. Note: add only one IPv4 address, IPv6 address or domain name per line. Comments introduced with '#' are allowed - wildcards and regex are not.
Edit Whitelist
This is the local banIP whitelist to always allow certain IP/CIDR addresses. Note: add only one IPv4 address, IPv6 address or domain name per line. Comments introduced with '#' are allowed - wildcards and regex are not.
Edit Maclist
This is the local banIP maclist to always-allow certain MAC addresses. Note: add only one MAC address per line. Comments introduced with '#' are allowed - domains, wildcards and regex are not.
Log View
The syslog output, pre-filtered for banIP related messages only.