{"id":842,"date":"2014-10-23T19:42:38","date_gmt":"2014-10-23T19:42:38","guid":{"rendered":"https:\/\/qbytes.cloud\/?p=842"},"modified":"2014-10-23T19:42:38","modified_gmt":"2014-10-23T19:42:38","slug":"whitelist-ips-fail2ban","status":"publish","type":"post","link":"https:\/\/www.qbytes.cloud\/index.php\/2014\/10\/23\/whitelist-ips-fail2ban\/","title":{"rendered":"Whitelist IP&#8217;s in Fail2ban"},"content":{"rendered":"<p>Whitelisting is setup in the jail.conf file using a space separated list.<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n\n&#x5B;DEFAULT]\n# &quot;ignoreip&quot; can be an IP address, a CIDR mask or a DNS host. Fail2ban will not                          \n# ban a host which matches an address in this list. Several addresses can be                             \n# defined using space separator.                                                                        \nignoreip = 127.0.0.1 192.168.1.0\/24 8.8.8.8\n\n<\/pre>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n\n# This will ignore connection coming from common private networks.\n# Note that local connections can come from other than just 127.0.0.1, so\n# this needs CIDR range too.\nignoreip = 127.0.0.0\/8 10.0.0.0\/8 172.16.0.0\/12 192.168.0.0\/16\n\n<\/pre>\n<p>Source: <a href=\"http:\/\/www.fail2ban.org\/wiki\/index.php\/Main_Page\" target=\"_blank\" rel=\"noopener\">http:\/\/www.fail2ban.org\/wiki\/index.php\/Main_Page<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whitelisting is setup in the jail.conf file using a space separated list. &#x5B;DEFAULT] # &quot;ignoreip&quot; can be an IP address, a CIDR mask or a DNS host. Fail2ban will not # ban a host which matches an address in this list. Several addresses can be # defined using space separator. ignoreip = 127.0.0.1 192.168.1.0\/24 8.8.8.8 &#8230; <a title=\"Whitelist IP&#8217;s in Fail2ban\" class=\"read-more\" href=\"https:\/\/www.qbytes.cloud\/index.php\/2014\/10\/23\/whitelist-ips-fail2ban\/\" aria-label=\"Read more about Whitelist IP&#8217;s in Fail2ban\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,102],"tags":[],"class_list":["post-842","post","type-post","status-publish","format-standard","hentry","category-fail2ban","category-security"],"_links":{"self":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts\/842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/comments?post=842"}],"version-history":[{"count":0,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts\/842\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/media?parent=842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/categories?post=842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/tags?post=842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}