Thanks for this. One thing: on a Debian Bookworm machine (and maybe other Linux distros), for fail2ban you should 'sudo touch jail.local', not 'cp jail.conf jail.local'. Then 'sudo nano jail.local' and in there enter
[sshd]
backend = systemd
enabled = true
Save, close, restart as above. You can add other conf options in .local but the above is enough to get it running.
What awesome guidelines! I just learned about the importance of UFW and Fail2ban settings. When I checked the /var/log/auth.log file, I found numerous login attempts to my server. Enabling UFW and Fail2ban will definitely be mandatory items on my checklist for future setups.
Thanks for this. One thing: on a Debian Bookworm machine (and maybe other Linux distros), for fail2ban you should 'sudo touch jail.local', not 'cp jail.conf jail.local'. Then 'sudo nano jail.local' and in there enter
[sshd]
backend = systemd
enabled = true
Save, close, restart as above. You can add other conf options in .local but the above is enough to get it running.
What awesome guidelines! I just learned about the importance of UFW and Fail2ban settings. When I checked the /var/log/auth.log file, I found numerous login attempts to my server. Enabling UFW and Fail2ban will definitely be mandatory items on my checklist for future setups.
Thanks Risal, glad it helped you!
This was awesome and easy to understand! It's amazing how u make stuff so easy and intuitive. Def gonna use it🔥
Thank you Alpaysh!
Glad I could help 🫡
🤝💯