Is there any facility within Strongswan to rate limit what appear to be break-in attempts from random IPs, that i am seeing in my logs? Or perhaps a way to do it with iptables on the Strongswan machine?
Code:
Oct 24 18:18:45 Gateway ipsec[215]: 02[NET] received invalid IKE header from 172.56.40.109 - ignored
Oct 24 18:18:45 Gateway ipsec[215]: 02[ENC] header verification failed
Oct 24 18:18:45 Gateway ipsec[215]: 02[NET] received invalid IKE header from 172.56.40.109 - ignored
Oct 24 18:18:45 Gateway ipsec[215]: 02[ENC] header verification failed
Oct 24 18:18:45 Gateway ipsec[215]: 02[NET] received invalid IKE header from 172.56.40.109 - ignored
Oct 24 18:18:45 Gateway ipsec[215]: 02[ENC] header verification failed
Oct 24 18:18:45 Gateway ipsec[215]: 02[NET] received invalid IKE header from 172.56.40.109 - ignored
Oct 24 18:18:45 Gateway ipsec[215]: 02[ENC] header verification failed
Oct 24 18:18:45 Gateway ipsec[215]: 02[NET] received invalid IKE header from 172.56.40.109 - ignored
Oct 24 18:18:45 Gateway ipsec[215]: 02[ENC] header verification failed
Oct 24 18:18:45 Gateway ipsec[215]: 02[NET] received invalid IKE header from 172.56.40.109 - ignored
Oct 24 18:18:45 Gateway ipsec[215]: 02[ENC] header verification failed
Oct 24 18:18:45 Gateway ipsec[215]: 02[NET] received invalid IKE header from 172.56.40.109 - ignored
Oct 24 18:18:45 Gateway ipsec[215]: 02[ENC] header verification failed
Oct 24 18:18:45 Gateway ipsec[215]: 02[NET] received invalid IKE header from 172.56.40.109 - ignored
Oct 24 18:18:45 Gateway ipsec[215]: 02[ENC] header verification failed
Oct 24 18:18:45 Gateway ipsec[215]: 02[NET] received invalid IKE header from 172.56.40.109 - ignored
.
.
.
.