Hi,
blocking staticly on the "friendly-scanner" string might not be the smartest way. Not everyone is so "friendly" to include the "friendly-scanner" string. fail2ban seems reasonably, or take a look at that tutorial by daniel: http://kb.asipto.com/kamailio:usage:k31-sip-scanning-attack (using htable)
greetz
Am 30.12.2013 09:33, schrieb Juha Heinanen:
Visetel LLC writes:
I added the following rules on iptables, but it does not work.
might be easier to use fail2ban and let it deal with iptables.
-- juha
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list sr-users@lists.sip-router.org http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users