I assumed, incorrectly, that adding an IP or an IP range "deny" setting in Global\Server Details\IP Access would prevent that IP/IP range from being able to attempt connection to my hosts. Upon further review, it appears that it only steps into the equation after an authentication attempt is made. In their defense, it actually says "Server IP access rules are checked when a physical connection is established with the file server, but before a welcome message is sent." That's somewhat ambiguous language. If the rules are checked when a physical connection is established, then of course that happens before a welcome message is sent. Hard to send a welcome message without a physical connection.
I intended to use "deny" settings here to keep large chunks of Chinese IP blocks off our radar, and this is where the majority of our nefarious logon attempts come from. Also, occasionally, these attempts will lock out one of our user accounts. (In case you're wondering, yes, I do have the "Block users who connect more than X times within Y seconds for Z minutes" setting turned on.) Unfortunately, adding IP restrictions in this manner does not inhibit an IP from attempting to authenticate. For example, here is one of the rules (in "export" format) from one of our hosts:
"IP","Description","Allow"
"49.88.112.1-49.88.112.254","6/16/20 China","0"
And here is a chunk of the log on that host from yesterday (local IP redacted to protect the innocent):
[02] Mon 13Dec21 09:59:26 - (018537) Connected to 49.88.112.112 (local address www.xxx.yyy.zzz, port 22)
[06] Mon 13Dec21 09:59:33 - Event: USER_LOGIN_FAILURE (Event 03); Type: EVENT LOG
[02] Mon 13Dec21 09:59:33 - (018537) Invalid login credentials; user: "root"; password: "**********"
[06] Mon 13Dec21 09:59:35 - Event: USER_LOGIN_FAILURE (Event 03); Type: EVENT LOG
[02] Mon 13Dec21 09:59:35 - (018537) Invalid login credentials; user: "root"; password: "**********"
[06] Mon 13Dec21 09:59:35 - Event: USER_LOGIN_FAILURE (Event 03); Type: EVENT LOG
[02] Mon 13Dec21 09:59:35 - (018537) Invalid login credentials; user: "root"; password: "**********"
[02] Mon 13Dec21 09:59:35 - (018537) Password wrong too many times for user "root" - disconnecting
[02] Mon 13Dec21 09:59:35 - (018537) Closed session
Maybe I should be tapping all this in as a feature request, but ideally when we enter something to deny an IP, it'd be great if it would deny the IP.