Thank you for your response!....
1.
I am setup like below
/etc/iptables/rules.v4
-A INPUT -p tcp -m tcp --dport 60 -j ACCEPT
-A INPUT -p udp -m udp --dport 60 -j ACCEPT
2.
/etc/fail2ban# cat jail.local
[voip]
enabled = true
port = 60
logpath = /var/log/60.log
action = iptables-allports[name=voip, protocol=all]
maxretry = 10
findtime = 60
bantime = 3600
3.
root@pbx:/etc/fail2ban/filter.d# cat voip.conf
# Option: failregex
# Notes.: regex to match the password failures messages in the logfile. The
# host must be matched by a group named "host". The tag "<HOST>" can
# be used for standard IP/hostname matching and is only an alias for
# (?:::f{4,6}
?(?P<host>[\w\-.^_]+)
# Values: TEXT
#
failregex = \[WARNING\] sofia_reg.c:\d+ SIP auth failure \(REGISTER\) on sofia profile \'.*\' for \[.*\] from ip <HOST>
\[WARNING\] sofia_reg.c:\d+ SIP auth failure \(INVITE\) on sofia profile \'.*\' for \[.*\] from ip <HOST>
# Option: ignoreregex
# Notes.: regex to ignore. If this regex matches, the line is ignored.
# Values: TEXT
#
ignoreregex =
Then try to telnet error
telnet: Unable to connect to remote host: Connection refused
I mean firewall not configure properly.
Thanks.