Book Image

Mastering FreeSWITCH

By : Russell Treleaven, Seven Du, Darren Schreiber, Ken Rice, Mike Jerris, Kalyani Kulkarni, Florent Krieg, Charles Bujold
4 (1)
Book Image

Mastering FreeSWITCH

4 (1)
By: Russell Treleaven, Seven Du, Darren Schreiber, Ken Rice, Mike Jerris, Kalyani Kulkarni, Florent Krieg, Charles Bujold

Overview of this book

FreeSWITCH is one of the best tools around if you’re looking for a modern method of managing communication protocols through a range of different media. From real-time browser communication with the WebRTC API to implementing VoIP (voice over internet protocol), with FreeSWITCH you’re in full control of your projects. This book shows you how to unlock its full potential – more than just a tutorial, it’s packed with plenty of tips and tricks to make it work for you. Written by members of the team who actually helped build FreeSWITCH, it will guide you through some of the newest features of version 1.6 including video transcoding and conferencing. Find out how FreeSWITCH interacts with other tools and APIs, learn how to tackle common (and not so common) challenges ranging from high availability to IVR development and programming advanced PBXs. Great communication functionality begins with FreeSWITCH – find out how and get your project up and running today.
Table of Contents (21 chapters)
Mastering FreeSWITCH
Credits
About the Authors
About the Reviewers
Contributors
www.PacktPub.com
Preface
7
WebRTC and Mod_Verto
Index

Fail2ban on all services


Fail2ban is a tool designed to monitor systems' log files and to trigger actions in case it detects traces of something suspicious. It is widely considered as an intrusion prevention tool. Many log files from different programs can be monitored at once, meaning that you can monitor as many different services as you want (including FreeSWITCH, of course). Various kinds of reactions can be configured to be triggered.

The configuration of fail2ban relies on three different concepts: Filters, actions and jails. A "filter" is a set of regular expressions used to identify suspicious behaviors in the monitored log file. As log lines are generally specific to each service, you will probably have one filter per service you want to protect (but it is not a rule). Then you have the "action": They describe what to trigger in case a filter matches a line. It can be for instance:

  • Block the attacker IP address in the iptable's firewall (most popular and useful)

  • Send an alarm message...