RBMTX-Viper banIP
The banIP page of RBMTX-Viper router is used to configure banIP package to block ip addresses/subnets via IPSet.
Overview
Information
banIP package details can be found in Information section. You can refresh timer, suspend, refresh or restart the package using the corresponding buttons.
Name | Value | Description |
---|---|---|
Status / Version | Package status and version | |
IPSet Information | ||
Active Sources | ||
Active Devices | ||
Active Interfaces | ||
Active Logterms | ||
Active Subnets | ||
Run Information | ||
Run Flags | ||
Last Run |
Settings
General Settings
Name | Value | Description |
---|---|---|
Enabled | On/Off, default: Off | Enable the banIP service. |
Startup Trigger Interface | unspecified, dhcp, gsm or lan, default: gsm | List of available network interfaces to trigger the banIP start. |
Auto Detection | On/Off, default: On | Detect relevant network interfaces, devices, subnets and protocols automatically. |
Log Monitor | On/Off, default: Off | Starts a small log monitor in the background to block suspicious SSH/LuCI login attempts. |
Enable SRC logging | On/Off, default: On | Log suspicious incoming packets - usually dropped. |
Enable DST logging | On/Off, default: Off | Log suspicious outgoing packets - usually rejected. Logging such packets may cause an increase in latency due to it requiring additional system resources. |
Whitelist Only | On/Off, default: Off | Restrict the internet access from/to a small number of secure websites/IPs and block access from/to the rest of the internet. |
E-Mail Notification | On/Off, default: Off | Send banIP related notification e-mails. This needs the installation and setup of the additional 'msmtp' package. |
Additional Settings
Name | Value | Description |
---|---|---|
Verbose Debug Logging | On/Off, default: Off | Enable verbose debug logging in case of any processing errors. |
Service Priority | Highest Priority, High Priority, Normal Priority, Less Priority or Least Priority, default: Normal Priority | The selected priority will be used for banIP background processing. This change requires a full banIP service restart to take effect. |
Trigger Delay | range from 1 to 120, default: 5 | Additional trigger delay in seconds before banIP processing begins. |
Download Queue | 1, 2, 4, 8, 16 or 32, default: 4 | Size of the download queue for download processing in parallel. |
Base Temp Directory | Base Temp Directory used for all banIP related runtime operations. | |
Backup Directory | Target directory for compressed source list backups. | |
Report Directory | Target directory for IPSet related report files. | |
Download Utility | uclient-fetch, wget, curl or aria2c, default: none | List of supported and fully pre-configured download utilities. |
Download Insecure | On/Off, default: Off | Don't check SSL server certificates during download. |
Download Parameters | Manually override the pre-configured download options for the selected download utility. |
Advanced Chain Settings
Advanced Chain Settings tab is divided into three parts: Individual IPSet Settings, IPv4 Chains and IPv6 Chains which are described in the table below. Note: Changes on this tab needs a full banIP service restart to take effect.
Name | Value | Description |
---|---|---|
Global IPSet Type | src_dst, src or dst, default: src+dst | Set the global IPset type default, to block incoming (SRC) and/or outgoing (DST) packets. |
SRC Target | DROP or REJECT, default: DROP | Set the firewall target for all SRC related rules. |
DST Target | REJECT or DROP, default: REJECT | Set the firewall target for all DST related rules. |
Maclist Timeout | 30 minutes, 1 hour, 6 hours, 12 hours or 24 hours, default: none | Set the maclist IPSet timeout. |
Whitelist Timeout | 30 minutes, 1 hour, 6 hours, 12 hours or 24 hours, default: none | Set the whitelist IPSet timeout. |
Blacklist Timeout | 30 minutes, 1 hour, 6 hours, 12 hours or 24 hours, default: none | Set the blacklist IPSet timeout. |
SRC IPSet Type | Set individual SRC type per IPset to block only incoming packets. | |
DST IPSet Type | Set individual DST type per IPset to block only outgoing packets. | |
SRC+DST IPSet Type | Set individual SRC+DST type per IPset to block incoming and outgoing packets. | |
LAN Input (IPv4 Chains) | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_lan_rule'. | |
LAN Forward | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_lan_rule'. | |
WAN Input | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_wan_rule'. | |
WAN Forward | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_wan_rule'. | |
LAN Input (IPv6 Chains) | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_lan_rule'. | |
LAN Forward | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_lan_rule'. | |
WAN Input | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'input_wan_rule'. | |
WAN Forward | Assign one or more relevant firewall chains to banIP. The default chain used by banIP is 'forwarding_wan_rule'. |
Advanced Log Settings
Note: Changes on this tab needs a full banIP service restart to take effect.
Name | Value | Description |
---|---|---|
Log Limit | 50, 100, 250 or 500, default: 100 | Parse only the last stated number of log entries for suspicious events. |
Log Terms | dropbear, sshd, luci or nginx, default: none | Limit the log monitor to certain log terms. |
SSH Log Count | range from 1 to 10, default: 3 | Number of failed ssh login repetitions of the same ip in the log before banning. |
LuCI Log Count | range from 1 to 10, default: 3 | Number of failed LuCI login repetitions of the same ip in the log before banning. |
NGINX Log Count | range from 1 to 20, default: 5 | Number of failed nginx requests of the same ip in the log before banning. |
SRC Log Options | -m limit --limit 2/sec (default), -m limit --limit 10/sec or custom, default: none | Set special SRC log options, e.g. to set a limit rate. |
DST Log Options | -m limit --limit 2/sec (default), -m limit --limit 10/sec or custom, default: none | Set special DST log options, e.g. to set a limit rate. |
Advanced E-Mail Settings
Name | Value | Description |
---|---|---|
E-Mail Sender Address | Sender address for banIP notification E-Mails. | |
E-Mail Topic | string | Topic for banIP notification E-Mails. |
E-Mail Profile | string | Profile used by 'msmtp' for banIP notification E-Mails. |
E-Mail Actions | start, reload, restart or refresh, default: none | Limit E-Mail trigger to certain banIP actions. |
Blocklist Sources
In Blocklist Sources tab user can manage supported and fully pre-configured banIP sources. Section is divided into three parts: Country Selection, ASN Selection and Local Sources which are described in the table below.
Name | Value | Description |
---|---|---|
Countries | ||
ASNs | ||
Local Sources | ||
Extra Sources | ||
Auto Blacklist | ||
Auto Whitelist |
IPSet Report
This tab shows the last generated IPSet Report. Press the Refresh button to get a current one. To Search the active banIP-related IPSets for a specific IP, CIDR or MAC address press IPSet Querry button.
Name | Value | Description |
---|---|---|
Timestamp | ||
Number of all IPSets | number | |
Number of all entries | number | |
Number of IP entries | number | |
Number of CIDR entries | number | |
Number of MAC entries | number | |
Number of accessed entries | number |
Edit Blacklist
This is the local banIP blacklist to always-deny certain IP/CIDR addresses. Note: add only one IPv4 address, IPv6 address or domain name per line. Comments introduced with '#' are allowed - wildcards and regex are not.
Edit Whitelist
This is the local banIP whitelist to always allow certain IP/CIDR addresses. Note: add only one IPv4 address, IPv6 address or domain name per line. Comments introduced with '#' are allowed - wildcards and regex are not.
Edit Maclist
This is the local banIP maclist to always-allow certain MAC addresses. Note: add only one MAC address per line. Comments introduced with '#' are allowed - domains, wildcards and regex are not.
Log View
The syslog output, pre-filtered for banIP related messages only.