{"id":689,"date":"2025-04-09T09:40:41","date_gmt":"2025-04-09T09:40:41","guid":{"rendered":"https:\/\/elypsecloud.com\/blog\/?p=689"},"modified":"2025-04-09T09:40:42","modified_gmt":"2025-04-09T09:40:42","slug":"proteger-son-vps-linux-avec-fail2ban-en-2025-guide-complet","status":"publish","type":"post","link":"https:\/\/elypsecloud.com\/blog\/index.php\/2025\/04\/09\/proteger-son-vps-linux-avec-fail2ban-en-2025-guide-complet\/","title":{"rendered":"Prot\u00e9ger son VPS Linux avec Fail2ban en 2025 : guide complet"},"content":{"rendered":"\n<p>La s\u00e9curit\u00e9 d\u2019un VPS Linux est primordiale, surtout en 2025 o\u00f9 les attaques automatis\u00e9es sont toujours plus nombreuses. Pour vous prot\u00e9ger contre les connexions SSH frauduleuses, les scans malveillants ou les tentatives de brute-force,&nbsp;<strong>Fail2ban<\/strong>&nbsp;reste l\u2019une des solutions les plus efficaces et l\u00e9g\u00e8res \u00e0 mettre en place. Voici un guide simple pour s\u00e9curiser votre serveur avec&nbsp;<strong><a href=\"https:\/\/github.com\/fail2ban\/fail2ban\" title=\"\">Fail2ban<\/a><\/strong> avec <a href=\"https:\/\/elypsecloud.com\" title=\"\">Elypsecloud<\/a> !<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Qu\u2019est-ce que <a href=\"https:\/\/github.com\/fail2ban\/fail2ban\" title=\"\">Fail2ban<\/a> ?<\/h2>\n\n\n\n<p><strong>Fail2ban<\/strong>&nbsp;est un outil open source qui surveille vos fichiers de logs pour rep\u00e9rer des comportements suspects (comme des \u00e9checs de connexion r\u00e9p\u00e9t\u00e9s). Lorsqu\u2019une menace est d\u00e9tect\u00e9e, il applique automatiquement des&nbsp;<strong>r\u00e8gles de bannissement temporaire<\/strong>&nbsp;via le pare-feu (iptables ou nftables).<\/p>\n\n\n\n<p>\u27a1\ufe0f Tr\u00e8s utile contre :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Brute-force SSH<\/li>\n\n\n\n<li>Tentatives sur Apache\/Nginx, FTP, Postfix, etc.<\/li>\n\n\n\n<li>Bots malveillants<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">1. Installer Fail2ban<\/h2>\n\n\n\n<p>Sous Debian\/Ubuntu :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt update &amp;&amp; sudo apt install fail2ban -y<\/code><\/pre>\n\n\n\n<p>Sous CentOS\/RHEL :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>yum install epel-release -y\nyum install fail2ban -y<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/elypsecloud.com\/blog\/wp-content\/uploads\/2025\/04\/image-9-1024x576.png\" alt=\"\" class=\"wp-image-695\" style=\"width:744px;height:auto\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">2. Configurer Fail2ban (SSH par d\u00e9faut)<\/h2>\n\n\n\n<p>Cr\u00e9ez un fichier de configuration personnalis\u00e9 pour \u00e9viter d\u2019\u00e9craser les valeurs lors d\u2019une mise \u00e0 jour :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo cp \/etc\/fail2ban\/jail.conf \/etc\/fail2ban\/jail.local<\/code><\/pre>\n\n\n\n<p>Dans le fichier&nbsp;<code>jail.local<\/code>, cherchez la section&nbsp;<code>[sshd]<\/code>&nbsp;et modifiez :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>enabled = true\nport = ssh\nfilter = sshd\nlogpath = \/var\/log\/auth.log\nmaxretry = 5\nbantime = 1h\nfindtime = 10m<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>maxretry<\/strong>&nbsp;: nombre d\u2019\u00e9checs autoris\u00e9s<\/li>\n\n\n\n<li><strong>bantime<\/strong>&nbsp;: dur\u00e9e du bannissement<\/li>\n\n\n\n<li><strong>findtime<\/strong>&nbsp;: fen\u00eatre de temps pour compter les tentatives<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">3. Activer et d\u00e9marrer Fail2ban<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo systemctl enable fail2ban\nsudo systemctl start fail2ban<\/code><\/pre>\n\n\n\n<p>V\u00e9rifiez son \u00e9tat :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo systemctl status fail2ban<\/code><\/pre>\n\n\n\n<p>Pour voir les IP bannies en temps r\u00e9el :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo fail2ban-client status sshd<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">4. Ajouter d\u2019autres protections (Apache, FTP, etc.)<\/h2>\n\n\n\n<p>Vous pouvez activer d\u2019autres jails dans&nbsp;<code>jail.local<\/code>, par exemple :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;nginx-http-auth]\nenabled = true\nfilter = nginx-http-auth\nlogpath = \/var\/log\/nginx\/error.log\nmaxretry = 3<\/code><\/pre>\n\n\n\n<p>Autres jails populaires :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>apache-auth<\/li>\n\n\n\n<li>dovecot<\/li>\n\n\n\n<li>postfix<\/li>\n\n\n\n<li>recidive (pour bannir les IP r\u00e9cidivistes plus longtemps)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">5. Fail2ban en 2025 : quelles nouveaut\u00e9s ?<\/h2>\n\n\n\n<p>\u2705 Fail2ban continue d\u2019\u00eatre activement maintenu en 2025 \u2705 Il est d\u00e9sormais compatible avec&nbsp;<strong><a href=\"https:\/\/www.linuxembedded.fr\/2022\/06\/introduction-a-nftables\" title=\"\">nftables<\/a><\/strong>&nbsp;(le rempla\u00e7ant d\u2019iptables sur Debian 11+ et Ubuntu 22.04+) \u2705 Possibilit\u00e9 d\u2019envoi de notifications email ou webhook (Discord, Telegram, etc.)<\/p>\n\n\n\n<p>\ud83d\udca1 Int\u00e9gration facile avec&nbsp;<strong><a href=\"https:\/\/grafana.com\/\" title=\"\">Grafana<\/a><\/strong>,&nbsp;<strong><a href=\"https:\/\/www.netdata.cloud\/\" title=\"\">Netdata<\/a><\/strong>, ou des panels comme&nbsp;<strong>Cockpit<\/strong>&nbsp;pour avoir une vision graphique des bannissements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bonus : recevoir une alerte mail en cas de bannissement<\/h2>\n\n\n\n<p>Installez sendmail ou postfix, puis ajoutez dans&nbsp;<code>\/etc\/fail2ban\/jail.local<\/code>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>action = %(action_mwl)s<\/code><\/pre>\n\n\n\n<p>Vous recevrez un mail avec l\u2019IP bannie, le port cibl\u00e9, etc.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Fail2ban reste en 2025 un outil&nbsp;<strong>indispensable pour prot\u00e9ger son VPS Linux<\/strong>&nbsp;sans surcharger le syst\u00e8me. Facile \u00e0 installer, personnalisable et robuste, il constitue une premi\u00e8re ligne de d\u00e9fense efficace contre les attaques automatis\u00e9es.<\/p>\n\n\n\n<p>\ud83c\uddeb\ud83c\uddf7 Vous cherchez un h\u00e9bergement en datacenter fran\u00e7ais, s\u00e9curis\u00e9 et sur mesure ?<br>\u27a1\ufe0f D\u00e9couvrez <a href=\"https:\/\/elypsecloud.com\">ElypseCloud<\/a>, votre partenaire cloud 100 % local, 100 % souverain, et restez maitre de vos donn\u00e9es !<\/p>\n\n\n\n<p>Nos serveurs d\u00e9di\u00e9s : <a href=\"https:\/\/elypsecloud.com\/serveurs-dedies\">https:\/\/elypsecloud.com\/serveurs-dedies<\/a><\/p>\n\n\n\n<p>Nos VPS : <a href=\"https:\/\/elypsecloud.com\/vps-linux\">https:\/\/elypsecloud.com\/vps-linux<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La s\u00e9curit\u00e9 d\u2019un VPS Linux est primordiale, surtout en 2025 o\u00f9 les attaques automatis\u00e9es sont toujours plus nombreuses. Pour vous prot\u00e9ger contre les connexions SSH frauduleuses, les scans malveillants ou les tentatives de brute-force,&nbsp;Fail2ban&nbsp;reste l\u2019une des solutions les plus efficaces et l\u00e9g\u00e8res \u00e0 mettre en place. Voici un guide simple pour s\u00e9curiser votre serveur avec&nbsp;Fail2ban [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-689","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"blocksy_meta":[],"aioseo_notices":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Edouard de l'\u00e9quipe ElypseCloud","author_link":"https:\/\/elypsecloud.com\/blog\/index.php\/author\/adminelypse\/"},"uagb_comment_info":0,"uagb_excerpt":"La s\u00e9curit\u00e9 d\u2019un VPS Linux est primordiale, surtout en 2025 o\u00f9 les attaques automatis\u00e9es sont toujours plus nombreuses. Pour vous prot\u00e9ger contre les connexions SSH frauduleuses, les scans malveillants ou les tentatives de brute-force,&nbsp;Fail2ban&nbsp;reste l\u2019une des solutions les plus efficaces et l\u00e9g\u00e8res \u00e0 mettre en place. Voici un guide simple pour s\u00e9curiser votre serveur avec&nbsp;Fail2ban\u2026","_links":{"self":[{"href":"https:\/\/elypsecloud.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elypsecloud.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elypsecloud.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elypsecloud.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elypsecloud.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=689"}],"version-history":[{"count":4,"href":"https:\/\/elypsecloud.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/689\/revisions"}],"predecessor-version":[{"id":696,"href":"https:\/\/elypsecloud.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/689\/revisions\/696"}],"wp:attachment":[{"href":"https:\/\/elypsecloud.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elypsecloud.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elypsecloud.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}