1) Looking in the 'Non-Web Blocked Events' report, I saw this IP listed as 'High Risk': 162.248.241.94.
a. First off, stuff that shows up in this report is inbound, unsolicited, right?
b. The hostname on my LAN this was associated with was my VoIP box. Safe to ignore? Should I follow the advice I read on another post and just use the bypass for devices like this?
c. Since the IP -might- change.....being DHCP, you never know I guess?.... is there a way to bypass based on MAC address?
2) I saw some (port scanning?) hits from from a few international IPs. Looks like they're all on port 32400....one of the very few ports I have open (for Plex). Looks like the TP module blocked them....(I think).... but...
a. is there a way to ratchet up the response like a Fail2Ban thing. Where if so many hits come in, Untangle will automatically block that IP from every talking to me again?
b. Or do I play whack-a-mole and start manually creating firewall rules for repeat abusers?

a. First off, stuff that shows up in this report is inbound, unsolicited, right?
b. The hostname on my LAN this was associated with was my VoIP box. Safe to ignore? Should I follow the advice I read on another post and just use the bypass for devices like this?
c. Since the IP -might- change.....being DHCP, you never know I guess?.... is there a way to bypass based on MAC address?
2) I saw some (port scanning?) hits from from a few international IPs. Looks like they're all on port 32400....one of the very few ports I have open (for Plex). Looks like the TP module blocked them....(I think).... but...
a. is there a way to ratchet up the response like a Fail2Ban thing. Where if so many hits come in, Untangle will automatically block that IP from every talking to me again?
b. Or do I play whack-a-mole and start manually creating firewall rules for repeat abusers?
Comment