is there any way to block "port scanners" or like, causing floods in my logs? I have openvpn server on 1194/udp, and few times a day I am facing logs like this:
And by flood I mean ~10k same lines in second:Feb 20 13:19:22 mktk-hostname ovpn,info <50.116.31.18>: disconnected <TLS failed>
Is there any way to block those in firewall by some "failed" rule after few packets? To prevent legal connection attempts being blocked.root@syslog:/var/log/mktk# grep 13:19:22 mktk-hostname.log | grep disconnected | wc -l
10100