[GH-ISSUE #96] Is there any way to combine this with fail2ban? #83

Closed
opened 2026-03-02 07:11:35 +03:00 by kerem · 4 comments
Owner

Originally created by @AnderssonPeter on GitHub (Oct 25, 2018).
Original GitHub issue: https://github.com/hwdsl2/docker-ipsec-vpn-server/issues/96

Is there any way to combine this with fail2ban?

Originally created by @AnderssonPeter on GitHub (Oct 25, 2018). Original GitHub issue: https://github.com/hwdsl2/docker-ipsec-vpn-server/issues/96 Is there any way to combine this with fail2ban?
kerem closed this issue 2026-03-02 07:11:35 +03:00
Author
Owner

@hwdsl2 commented on GitHub (Oct 26, 2018):

@AnderssonPeter Hello! To my knowledge there is no existing fail2ban filters that work well with IPsec. You may be able to write your own, however.

<!-- gh-comment-id:433469726 --> @hwdsl2 commented on GitHub (Oct 26, 2018): @AnderssonPeter Hello! To my knowledge there is no existing fail2ban filters that work well with IPsec. You may be able to write your own, however.
Author
Owner

@AnderssonPeter commented on GitHub (Oct 27, 2018):

Where are the logs stored in the container?

<!-- gh-comment-id:433643390 --> @AnderssonPeter commented on GitHub (Oct 27, 2018): Where are the logs stored in the container?
Author
Owner

@hwdsl2 commented on GitHub (Oct 27, 2018):

@AnderssonPeter Please refer to [1] for how to enable Libreswan logs. For xl2tpd logs, you may check using e.g. docker logs ipsec-vpn-server.

[1] https://github.com/hwdsl2/docker-ipsec-vpn-server#enable-libreswan-logs

<!-- gh-comment-id:433646356 --> @hwdsl2 commented on GitHub (Oct 27, 2018): @AnderssonPeter Please refer to [1] for how to enable Libreswan logs. For xl2tpd logs, you may check using e.g. `docker logs ipsec-vpn-server`. [1] https://github.com/hwdsl2/docker-ipsec-vpn-server#enable-libreswan-logs
Author
Owner

@rasodu commented on GitHub (Dec 30, 2020):

I just exposed the VPN ports on my router.
I want to understand how easy/difficult is for someone to brute force authenticate.
How long would it take someone to get in? (Assuming it's not an easy password to guess.)

<!-- gh-comment-id:752326607 --> @rasodu commented on GitHub (Dec 30, 2020): I just exposed the VPN ports on my router. I want to understand how easy/difficult is for someone to brute force authenticate. How long would it take someone to get in? (Assuming it's not an easy password to guess.)
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/docker-ipsec-vpn-server#83
No description provided.