FTP Brute-Force Protection
RdpGuard protects your FTP server from brute-force attacks. It monitors FTP port and blocks attackers IP addresses when the number of failed login attempts reaches the set limit. Check out the instructions below to learn how to enable and configure FTP brute-force protection.
To enable and configure FTP brute-force protection
1. Start RdpGuard Dashboard and click on the link next to FTP
FTP Protection Link in RdpGuard Dashboard
FTP Settings dialog will open:
FTP Detection Engine Settings
2. Select traffic monitoring method for FTP protocol:
In new versions of RdpGuard we switched from log parsing detection to traffic based methods. This allows us to support the Protocol instead of particular software (because logs are software-specific)
The following traffic-based methods are available:
- Raw Sockets - Does not work on Windows Server 2008 or with firewalls.
- WinPcap - Works on all Windows Editions, WinPcap must be installed.
3. Specify FTP port
You may specify one or multiple comma-separated ports for FTP traffic monitoring.
4. Click Save to save changes. RdpGuard service will be restarted.