diff --git a/crowdsec-docs/docs/appsec/quickstart/traefik.mdx b/crowdsec-docs/docs/appsec/quickstart/traefik.mdx index d504e930e..a8d1ead25 100644 --- a/crowdsec-docs/docs/appsec/quickstart/traefik.mdx +++ b/crowdsec-docs/docs/appsec/quickstart/traefik.mdx @@ -372,7 +372,7 @@ spec: ``` You can still add some route configuration through -[IngressRoute](https://doc.traefik.io/traefik/reference/routing-configuration/kubernetes/crd/http/ingressroute/?utm_source=chatgpt.com) +[IngressRoute](https://doc.traefik.io/traefik/reference/routing-configuration/kubernetes/crd/http/ingressroute/) and attach the middleware to those routes. diff --git a/crowdsec-docs/unversioned/integrations/checkpoint.mdx b/crowdsec-docs/unversioned/integrations/checkpoint.mdx index c8e0a647d..8d3dee93b 100644 --- a/crowdsec-docs/unversioned/integrations/checkpoint.mdx +++ b/crowdsec-docs/unversioned/integrations/checkpoint.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Checkpoint integration allows you to block malicious IPs in your Checkpoint firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Checkpoint firewall. +Check Point refers to this feature as [**Custom Intelligence (IoC) Feeds**](https://support.checkpoint.com/results/sk/sk132193), which provide the ability to add custom cyber intelligence feeds into the Threat Prevention engine. + ### Prerequisites Before you begin, please ensure your Checkpoint device supports ingesting blocklists. If you are unsure, please refer to the Checkpoint documentation or contact Checkpoint support. diff --git a/crowdsec-docs/unversioned/integrations/cisco.mdx b/crowdsec-docs/unversioned/integrations/cisco.mdx index 60e593e55..139c35d76 100644 --- a/crowdsec-docs/unversioned/integrations/cisco.mdx +++ b/crowdsec-docs/unversioned/integrations/cisco.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Cisco integration allows you to block malicious IPs in your Cisco firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Cisco firewall. +Cisco refers to this feature as [**Security Intelligence feeds**](https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/objects-object-mgmt.html#ID-2243-00000291), which provide dynamic threat intelligence that can be used in your firewall policies. + ### Prerequisites Before you begin, please ensure your Cisco device supports ingesting blocklists. If you are unsure, please refer to the Cisco documentation or contact Cisco support. diff --git a/crowdsec-docs/unversioned/integrations/f5.mdx b/crowdsec-docs/unversioned/integrations/f5.mdx index 3e48e6967..c74f90df8 100644 --- a/crowdsec-docs/unversioned/integrations/f5.mdx +++ b/crowdsec-docs/unversioned/integrations/f5.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec F5 integration allows you to block malicious IPs in your F5 firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your F5 firewall. +F5 BIG-IP AFM refers to this feature as [**External IP blocklist**](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-per-request-policies/using-http-connector/creating-http-connector-request-external-IP-blocklist.html) or [**Feed lists**](https://techdocs.f5.com/kb/en-us/products/big-ip-afm/manuals/product/big-ip-afm-getting-started-14-1-0/04.html), which allow you to import external threat intelligence to block or allow traffic based on IP reputation. + ### Prerequisites Before you begin, please ensure your F5 device supports ingesting blocklists. If you are unsure, please refer to the F5 documentation or contact F5 support. @@ -52,7 +54,7 @@ Once the integration is generated you will be presented with a credentials scree }} /> -[F5 Documentation](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-per-request-policies/using-http-connector.html?utm_source=chatgpt.com) +[F5 Documentation](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-per-request-policies/using-http-connector.html) ## Format example diff --git a/crowdsec-docs/unversioned/integrations/fortinet.mdx b/crowdsec-docs/unversioned/integrations/fortinet.mdx index a5acd470b..c924e02b7 100644 --- a/crowdsec-docs/unversioned/integrations/fortinet.mdx +++ b/crowdsec-docs/unversioned/integrations/fortinet.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Fortinet integration allows you to block malicious IPs in your Fortinet firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Fortinet firewall. +Fortinet refers to this feature as [**IP address Threat Feeds**](https://docs.fortinet.com/document/fortigate/6.4.5/administration-guide/891236/external-blocklist-policy), which enable you to integrate external threat intelligence sources into your firewall policies. + ### Prerequisites Before you begin, please ensure your Fortinet device supports ingesting blocklists. If you are unsure, please refer to the Fortinet documentation or contact Fortinet support. diff --git a/crowdsec-docs/unversioned/integrations/juniper.mdx b/crowdsec-docs/unversioned/integrations/juniper.mdx index 791edb98e..bfc8ab972 100644 --- a/crowdsec-docs/unversioned/integrations/juniper.mdx +++ b/crowdsec-docs/unversioned/integrations/juniper.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Juniper integration allows you to block malicious IPs in your Juniper firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Juniper router. +Juniper refers to this feature as [**Security Dynamic Address feeds**](https://www.juniper.net/documentation/us/en/software/nm-apps23.1/policy-enforcer-user-guide/topics/task/dynamic-example.html), which allow you to import and automatically update IP address lists from external feed servers. + ### Prerequisites Before you begin, please ensure your Juniper device supports ingesting blocklists. If you are unsure, please refer to the Juniper documentation or contact Juniper support. @@ -52,7 +54,7 @@ Once the integration is generated you will be presented with a credentials scree }} /> -[Juniper Documentation JunOS](https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/edit-security-dynamic-address.html) +[Juniper Documentation JunOS](https://www.juniper.net/documentation/us/en/software/nm-apps23.1/policy-enforcer-user-guide/topics/task/dynamic-example.html) ## Configuration Example diff --git a/crowdsec-docs/unversioned/integrations/opnsense.mdx b/crowdsec-docs/unversioned/integrations/opnsense.mdx index 374dbcef3..6d9cc5e8b 100644 --- a/crowdsec-docs/unversioned/integrations/opnsense.mdx +++ b/crowdsec-docs/unversioned/integrations/opnsense.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec OPNsense integration allows you to block malicious IPs in your OPNsense firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your OPNsense firewall. +In OPNsense you'll use **URL Table (IPs) aliases** to create dynamic firewall aliases that automatically update from external URL sources. + ### Prerequisites Before you begin, please ensure your OPNsense software version supports ingesting blocklists (URL aliases). If you are unsure, please refer to the OPNsense documentation or contact OPNsense support. diff --git a/crowdsec-docs/unversioned/integrations/paloalto.mdx b/crowdsec-docs/unversioned/integrations/paloalto.mdx index 9ed380ec3..657823c34 100644 --- a/crowdsec-docs/unversioned/integrations/paloalto.mdx +++ b/crowdsec-docs/unversioned/integrations/paloalto.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl" The CrowdSec Palo Alto integration allows you to block malicious IPs in your Palo Alto firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Palo Alto firewall. +Palo Alto refers to this feature as [**External Dynamic Lists (EDL)**](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list), which allow you to import and automatically update blocklists from external sources. + ### Prerequisites Before you begin, please ensure your Palo Alto device supports ingesting blocklists. If you are unsure, please refer to the Palo Alto documentation or contact Palo Alto support. @@ -99,7 +101,7 @@ You should have your policy created, don't forget to click on ‘commit‘. ![](/img/paloalto_step7.png) -[Palo Alto Documentation](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list#idf36cb80a-77f1-4d17-9c4b-7efe9fe426af) +[Palo Alto Documentation](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list) [Video Tutorial](https://www.youtube.com/watch?v=QFVI4sOFoaI) ## Format example diff --git a/crowdsec-docs/unversioned/integrations/pfsense.mdx b/crowdsec-docs/unversioned/integrations/pfsense.mdx index cd5a5ae74..027424e64 100644 --- a/crowdsec-docs/unversioned/integrations/pfsense.mdx +++ b/crowdsec-docs/unversioned/integrations/pfsense.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec pfSense integration allows you to block malicious IPs in your pfSense firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your pfSense firewall. +pfSense you'll use **URL Table (IPs) aliases**, to create aliases that periodically download and update IP lists from external URLs. + ### Prerequisites Before you begin, please ensure your pfSense software version supports ingesting blocklists (URL aliases). If you are unsure, please refer to the pfSense documentation or contact pfSense support. diff --git a/crowdsec-docs/unversioned/integrations/sophos.mdx b/crowdsec-docs/unversioned/integrations/sophos.mdx index 3a88a0473..5cc30a494 100644 --- a/crowdsec-docs/unversioned/integrations/sophos.mdx +++ b/crowdsec-docs/unversioned/integrations/sophos.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Sophos integration allows you to block malicious IPs in your Sophos firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Sophos firewall. +Sophos refers to this feature as [**Third-Party Threat Feeds**](https://docs.sophos.com/nsg/sophos-firewall/latest/Help/en-us/webhelp/onlinehelp/AdministratorHelp/ActiveThreatResponse/ConfigureFeeds/ThirdPartyThreatFeeds/index.html), which enable you to integrate external sources of IP addresses, domains, and URLs involved in threat activity. + ### Prerequisites Before you begin, please ensure your Sophos device supports ingesting blocklists. If you are unsure, please refer to the Sophos documentation or contact Sophos support. diff --git a/crowdsec-docs/unversioned/troubleshooting/issue_integration_rc_offline.md b/crowdsec-docs/unversioned/troubleshooting/issue_integration_rc_offline.md index 530ed3934..6def3ebfa 100644 --- a/crowdsec-docs/unversioned/troubleshooting/issue_integration_rc_offline.md +++ b/crowdsec-docs/unversioned/troubleshooting/issue_integration_rc_offline.md @@ -3,7 +3,7 @@ title: Remediation Component Integration Offline id: issue_integration_rc_offline --- -The **Remediation Component Integration Offline** refers to a [Blocklist-Integration of type Remediation Component](http://localhost:3000/u/integrations/remediationcomponent) has not pulled from its endpoint for more than 24 hours. +The **Remediation Component Integration Offline** refers to a [Blocklist-Integration of type Remediation Component](/u/integrations/remediationcomponent) has not pulled from its endpoint for more than 24 hours. This issue applies to Remediation Components *(aka bouncers)* directly connected to a **Blocklist integration endpoint** *(aka Blocklist as a Service / BLaaS)*.