FTP Brute-Force Protection
Protection Overview RdpGuard protects your FTP server from brute-force attacks. It monitors FTP port and blocks attackers IP addresses when the number of failed login attempts reaches the set limit. Check out the instructions below to learn how to enable and configure FTP brute-force protection.
To enable and configure FTP brute-force protection 1. Start RdpGuard Dashboard and click on the link next to FTP 
FTP Protection Link in RdpGuard Dashboard FTP Settings dialog will open: 
FTP Detection Engine Settings 2. Select traffic monitoring method for FTP protocol: In new versions of RdpGuard we switched from log parsing detection to traffic based methods. This allows us to support the Protocol instead of particular software (because logs are software-specific) The following traffic-based methods are available: - Raw Sockets - Does not work on Windows Server 2008 or with firewalls.
- WinPcap - Works on all Windows Editions, WinPcap must be installed.
3. Specify FTP port You may specify one or multiple comma-separated ports for FTP traffic monitoring. 4. Click Save to save changes. RdpGuard service will be restarted.
|