1- ## Version 2022/08/06
1+ ## Version 2025/04/01
22#
33# WARNING: heavily refactored in 0.9.0 release. Please review and
44# customize settings for your setup.
@@ -99,7 +99,9 @@ before = paths-lsio.conf
9999# ignorecommand = /path/to/command <ip>
100100ignorecommand =
101101
102- # "bantime" is the number of seconds that a host is banned.
102+ # "bantime" is the amount of time that a host is banned, integer in seconds or
103+ # time abbreviation format (m - minutes, h - hours, d - days, w - weeks, mo - months, y - years).
104+ # This is to consider as an initial time if bantime.increment gets enabled.
103105bantime = 10m
104106
105107# A host is banned if it has generated "maxretry" during the last "findtime"
@@ -113,19 +115,17 @@ maxretry = 5
113115maxmatches = %(maxretry)s
114116
115117# "backend" specifies the backend used to get files modification.
116- # Available options are "pyinotify", "gamin", " polling", "systemd" and "auto".
118+ # Available options are "pyinotify", "polling", "systemd" and "auto".
117119# This option can be overridden in each jail as well.
118120#
119121# pyinotify: requires pyinotify (a file alteration monitor) to be installed.
120122# If pyinotify is not installed, Fail2ban will use auto.
121- # gamin: requires Gamin (a file alteration monitor) to be installed.
122- # If Gamin is not installed, Fail2ban will use auto.
123123# polling: uses a polling algorithm which does not require external libraries.
124124# systemd: uses systemd python library to access the systemd journal.
125125# Specifying "logpath" is not valid for this backend.
126126# See "journalmatch" in the jails associated filter config
127127# auto: will try to use the following backends, in order:
128- # pyinotify, gamin, polling.
128+ # pyinotify, polling.
129129#
130130# Note: if systemd backend is chosen as the default but you enable a jail
131131# for which logs are present only in its own log files, specify some other
@@ -207,8 +207,8 @@ fail2ban_agent = Fail2Ban/%(fail2ban_version)s
207207# iptables-multiport, shorewall, etc) It is used to define
208208# action_* variables. Can be overridden globally or per
209209# section within jail.local file
210- banaction = iptables-multiport
211- banaction_allports = iptables-allports
210+ # banaction = iptables-multiport
211+ # banaction_allports = iptables-allports
212212
213213# The simplest action to take: ban only
214214action_ = %(banaction)s[port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
0 commit comments