Ostatnio co raz częściej widzę w logach takie próby ataku na VPN
Cytat Feb 22 04:05:22 R7000 pptpd: CTRL: Client 123.151.42.61 control connection started
Feb 22 04:05:23 R7000 pptpd: CTRL: EOF or bad error reading ctrl packet length.
Feb 22 04:05:23 R7000 pptpd: CTRL: couldn't read packet header (exit)
Feb 22 04:05:23 R7000 pptpd: CTRL: CTRL read failed
Feb 22 04:05:23 R7000 pptpd: CTRL: Reaping child PPP[0]
Feb 22 04:05:23 R7000 pptpd: CTRL: Client 123.151.42.61 control connection finished
Czy można temu jakość zapobiegać i dla puli z Chin od razu robić reject?
---
Netgear R7000 • Netgear WNR3500L v2 • MikroTik hAP ac^2 • TP-LINK M7650
|