Fail2Ban Jails – adminbolt Admin Panel
The Fail2Ban Jails page shows the configured jails (e.g. sshd, vsftpd) and their status. Jails define which service is protected, which filter is used, and ban parameters.
URL: /admin/fail2ban-jails
Overview
Each Fail2Ban jail monitors a service (SSH, FTP, web server, etc.) using a filter and applies a ban action when the filter matches. This page lists jails, lets you enable or disable them, and often shows current status (active, banned count) or links to edit ban time and action.
Purpose
- View all Fail2Ban jails and their status (enabled/disabled, number of banned IPs).
- Enable or disable a jail without changing its configuration.
- Open jail configuration (ban time, max retry, filter, action) if the panel links to settings.
- Quickly see which services are protected by Fail2Ban.
Prerequisites
- Access to the admin panel in adminbolt.
- Fail2Ban in the sidebar (Fail2Ban → Jails).
- Fail2Ban installed on the server.
Interface Description
- Page heading: Jails (h1). Sub-navigation: Jails (current), List view.
- New Fail2BanJail – Link to
/admin/fail2ban-jails/createto add a new jail. - Search – Searchbox to filter the list.
- Table – Columns: Name (sortable), Port, Filter, Action, Log Path, Enabled, Actions. Rows list configured jails; use Actions to edit or manage.
Related sections
- Fail2Ban – Fail2Ban overview.
- Fail2Ban Settings – Configure jails (find time, ban time, max retry, log path, ban action).
- Fail2Ban Filters – Filters used by jails to parse logs.
- Banned IPs – View and unban IPs per jail.
- Fail2Ban Logs – Daemon log for troubleshooting.
Sidebar location
Fail2Ban → Jails
Notes
- Disabling a jail stops new bans for that service but does not unban already banned IPs; use Banned IPs to unban.
- Jail configuration (ban time, max retry, etc.) is often edited in Fail2Ban Settings → Jails tab.