RBMTX-Viper banIP

Z Elproma Wiki Knowledge Base
Skocz do: nawigacja, szukaj

The banIP page of RBMTX-Viper router is used to configure banIP package to block ip addresses/subnets via IPSet.

Overview

Information

banIP package details can be found in Information section. You can refresh timer, suspend, refresh or restart the package using the corresponding buttons.

Name Value Description
Status / Version Package status and version
IPSet Information
Active Sources
Active Devices
Active Interfaces
Active Logterms
Active Subnets
Run Information
Run Flags
Last Run

Web servicesbanipinformation.png

Settings

General Settings

Name Value Description
Enabled On/Off, default: Off Enable the banIP service.
Startup Trigger Interface unspecified, dhcp, gsm or lan, default: gsm List of available network interfaces to trigger the banIP start.
Auto Detection On/Off, default: On Detect relevant network interfaces, devices, subnets and protocols automatically.
Log Monitor On/Off, default: Off Starts a small log monitor in the background to block suspicious SSH/LuCI login attempts.
Enable SRC logging On/Off, default: On Log suspicious incoming packets - usually dropped.
Enable DST logging On/Off, default: Off Log suspicious outgoing packets - usually rejected. Logging such packets may cause an increase in latency due to it requiring additional system resources.
Whitelist Only On/Off, default: Off Restrict the internet access from/to a small number of secure websites/IPs and block access from/to the rest of the internet.
E-Mail Notification On/Off, default: Off Send banIP related notification e-mails. This needs the installation and setup of the additional 'msmtp' package.

Web servicesbanipgeneralsettings.png

Additional Settings

Name Value Description
Verbose Debug Logging On/Off, default: Off Enable verbose debug logging in case of any processing errors.
Service Priority Highest Priority, High Priority, Normal Priority, Less Priority or Least Priority, default: Normal Priority The selected priority will be used for banIP background processing. This change requires a full banIP service restart to take effect.
Trigger Delay range from 1 to 120, default: 5 Additional trigger delay in seconds before banIP processing begins.
Download Queue 1, 2, 4, 8, 16 or 32, default: 4 Size of the download queue for download processing in parallel.
Base Temp Directory Base Temp Directory used for all banIP related runtime operations.
Backup Directory Target directory for compressed source list backups.
Report Directory Target directory for IPSet related report files.
Download Utility uclient-fetch, wget, curl or aria2c, default: none List of supported and fully pre-configured download utilities.
Download Insecure On/Off, default: Off Don't check SSL server certificates during download.
Download Parameters Manually override the pre-configured download options for the selected download utility.

Web servicesbanipadditionalsettings.png

Advanced Chain Settings

Advanced Chain Settings tab is divided into three parts: Individual IPSet Settings, IPv4 Chains and IPv6 Chains which are described in the table below. Note: Changes on this tab needs a full banIP service restart to take effect.

Name Value Description
Global IPSet Type src_dst, src or dst, default: src+dst Set the global IPset type default, to block incoming (SRC) and/or outgoing (DST) packets.
SRC Target DROP or REJECT, default: DROP Set the firewall target for all SRC related rules.
DST Target REJECT or DROP, default: REJECT Set the firewall target for all DST related rules.
Maclist Timeout 30 minutes, 1 hour, 6 hours, 12 hours or 24 hours, default: none Set the maclist IPSet timeout.
Whitelist Timeout 30 minutes, 1 hour, 6 hours, 12 hours or 24 hours, default: none Set the whitelist IPSet timeout.
Blacklist Timeout 30 minutes, 1 hour, 6 hours, 12 hours or 24 hours, default: none Set the blacklist IPSet timeout.
SRC IPSet Type Set individual SRC type per IPset to block only incoming packets.
DST IPSet Type Set individual DST type per IPset to block only outgoing packets.
SRC+DST IPSet Type Set individual SRC+DST type per IPset to block incoming and outgoing packets.
LAN Input (IPv4 Chains) Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_lan_rule'.
LAN Forward Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_lan_rule'.
WAN Input Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_wan_rule'.
WAN Forward Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_wan_rule'.
LAN Input (IPv6 Chains) Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_lan_rule'.
LAN Forward Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_lan_rule'.
WAN Input Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_wan_rule'.
WAN Forward Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_wan_rule'.

Web servicesbanipadvancedchainsettings.png

Advanced Log Settings

Note: Changes on this tab needs a full banIP service restart to take effect.

Name Value Description
Log Limit 50, 100, 250 or 500, default: 100 Parse only the last stated number of log entries for suspicious events.
Log Terms dropbear, sshd, luci or nginx, default: none Limit the log monitor to certain log terms.
SSH Log Count range from 1 to 10, default: 3 Number of failed ssh login repetitions of the same ip in the log before banning.
LuCI Log Count range from 1 to 10, default: 3 Number of failed LuCI login repetitions of the same ip in the log before banning.
NGINX Log Count range from 1 to 20, default: 5 Number of failed nginx requests of the same ip in the log before banning.
SRC Log Options -m limit --limit 2/sec (default), -m limit --limit 10/sec or custom, default: none Set special SRC log options, e.g. to set a limit rate.
DST Log Options -m limit --limit 2/sec (default), -m limit --limit 10/sec or custom, default: none Set special DST log options, e.g. to set a limit rate.

Web servicesbanipadvancedlogsettings.png

Advanced E-Mail Settings

Name Value Description
E-Mail Sender Address Sender address for banIP notification E-Mails.
E-Mail Topic string Topic for banIP notification E-Mails.
E-Mail Profile string Profile used by 'msmtp' for banIP notification E-Mails.
E-Mail Actions start, reload, restart or refresh, default: none Limit E-Mail trigger to certain banIP actions.

Web servicesbanipadvancedemailsettings.png

Blocklist Sources

In Blocklist Sources tab user can manage supported and fully pre-configured banIP sources. Section is divided into three parts: Country Selection, ASN Selection and Local Sources which are described in the table below.

Name Value Description
Countries
ASNs
Local Sources
Extra Sources
Auto Blacklist
Auto Whitelist

Web servicesbanipblocklistsources.png

IPSet Report

This tab shows the last generated IPSet Report. Press the Refresh button to get a current one. To Search the active banIP-related IPSets for a specific IP, CIDR or MAC address press IPSet Querry button.

Name Value Description
Timestamp
Number of all IPSets number
Number of all entries number
Number of IP entries number
Number of CIDR entries number
Number of MAC entries number
Number of accessed entries number

Web servicesbanipipsetreport.png

Edit Blacklist

This is the local banIP blacklist to always-deny certain IP/CIDR addresses. Note: add only one IPv4 address, IPv6 address or domain name per line. Comments introduced with '#' are allowed - wildcards and regex are not.

Edit Whitelist

This is the local banIP whitelist to always allow certain IP/CIDR addresses. Note: add only one IPv4 address, IPv6 address or domain name per line. Comments introduced with '#' are allowed - wildcards and regex are not.

Edit Maclist

This is the local banIP maclist to always-allow certain MAC addresses. Note: add only one MAC address per line. Comments introduced with '#' are allowed - domains, wildcards and regex are not.

Log View

The syslog output, pre-filtered for banIP related messages only.