@w00t
It is indeed the case that you can keep the plesk-proftpd jail active, that suffices.
The above follows from the fact that port 21 will be used for commands and authentication, irregardless of active or passive mode.
However, you have to be aware of the fact that someone can attack the passive ports themselves (for instance, to overload the entire system and/or break the ftp server).
The problem with Fail2Ban is that it is not the best tool for IP banning of attacks on passive ports.
In general, the default proftpd filter (provided with Plesk and used in the plesk-proftpd jail) is sufficient to handle the most common scenario´s for FTP related attacks, including attacks on the passive ports themselves.
In addition, the default recidive jail (provided with Plesk) would also handle a lot of the common scenario´s for (all) FTP related attacks.
The concrete problem with Fail2Ban is that the massive surface attack, offered by the multiple passive ports, cannot be handled perfectly, consistently and without a performance penalty.
I would certainly not recommend to create a separate jail and/or filter for handling of passive ports by Fail2Ban.
Instead, I would strongly advice to use the more common firewall, such as the Plesk Firewall (i.e. only allow known and trusted IP addresses on the passive ports).
Hope the above helps!
Regards....