diff --git a/Shorewall/manpages/shorewall.conf.xml b/Shorewall/manpages/shorewall.conf.xml
index 8ea9696ef..90bd2453a 100644
--- a/Shorewall/manpages/shorewall.conf.xml
+++ b/Shorewall/manpages/shorewall.conf.xml
@@ -971,9 +971,7 @@
When ipset-based dynamic blacklisting is enabled, the contents
of the blacklist will be preserved over
stop/reboot/start
- sequences if SAVE_IPSETS=Yes, SAVE_IPSETS=ipv4 or if
- setname is included in the list of sets
- to be saved in SAVE_IPSETS.
+ sequences.
diff --git a/docs/blacklisting_support.xml b/docs/blacklisting_support.xml
index ec3b6cbed..1197736d1 100644
--- a/docs/blacklisting_support.xml
+++ b/docs/blacklisting_support.xml
@@ -250,14 +250,36 @@ DROP net:200.55.14.18 all
+
+
+ log
+
+
+ Added in Shorewall 5.2.5. When specified, successful
+ 'blacklist' and 'allow' commands will log a message to the system
+ log.
+
+
+
+
+ noupdate
+
+
+ Added in Shorewall 5.2.5. Normally, once an address has been
+ blacklisted, each time that a packet is received from the packet,
+ the ipset's entry for the address is updated to reset the timeout to
+ the value specifyed in the option above.
+ Setting the option, inhibits this
+ resetting of the entry's timeout. This option is ignored when the
+ option is not specified.
+
+ When ipset-based dynamic blacklisting is enabled, the contents of
the blacklist will be preserved over
stop/reboot/start
- sequences if SAVE_IPSETS=Yes, SAVE_IPSETS=ipv4 or if
- setname is included in the list of sets to be
- saved in SAVE_IPSETS.
+ sequences.
@@ -275,4 +297,43 @@ DROP net:200.55.14.18 all
shorewall show action BLACKLIST command for
details.
+
+
+ BLACKLIST and Fail2ban
+
+ The BLACKLIST command can be used as 'blocktype' in
+ /etc/fail2ban/actions.d/shorewall.conf. Prior to Shorewall 5.2.5, this
+ works best if there is no timeout
+ specified in the DYNAMIC_BLACKLIST setting or if timeout=0 is given.
+
+ Beginning with Shorewall 5.2.5, Shorewall includes new features that
+ allow fail2ban to work most seamlessly with Shorewall's ipset-based
+ blacklisting:
+
+
+
+ When a timeout is specified in
+ the DYNAMIC_BLACKLIST setting, the dynamic-blacklisting ipset is
+ created with default timeout 0. As entries are added by BLACKLIST
+ policies or by the blacklist command,
+ the created entry is given the specified timeout value.
+
+
+
+ The noupdate option has been
+ added. Specifying this option prevents 'timeout 0' ipset entries from
+ being changed to finite timeout entries as a result of blacklisted ip
+ addresses continuing to send packets to the firewall.
+
+
+
+ The blacklist! command has been
+ added. specifying that command as the fail2ban 'blocktype' causes
+ entries created by fail2ban to persist until fail2ban unbans them
+ using the Shorewall allow
+ comand.
+
+
+