Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion crowdsec-docs/docs/appsec/quickstart/traefik.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -372,7 +372,7 @@ spec:
```

You can still add some route configuration through
[IngressRoute](https://doc.traefik.io/traefik/reference/routing-configuration/kubernetes/crd/http/ingressroute/?utm_source=chatgpt.com)
[IngressRoute](https://doc.traefik.io/traefik/reference/routing-configuration/kubernetes/crd/http/ingressroute/)
and attach the middleware to those routes.
</TabItem>
</Tabs>
Expand Down
2 changes: 2 additions & 0 deletions crowdsec-docs/unversioned/integrations/checkpoint.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl";

The CrowdSec Checkpoint integration allows you to block malicious IPs in your Checkpoint firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Checkpoint firewall.

Check Point refers to this feature as [**Custom Intelligence (IoC) Feeds**](https://support.checkpoint.com/results/sk/sk132193), which provide the ability to add custom cyber intelligence feeds into the Threat Prevention engine.

### Prerequisites

Before you begin, please ensure your Checkpoint device supports ingesting blocklists. If you are unsure, please refer to the Checkpoint documentation or contact Checkpoint support.
Expand Down
2 changes: 2 additions & 0 deletions crowdsec-docs/unversioned/integrations/cisco.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl";

The CrowdSec Cisco integration allows you to block malicious IPs in your Cisco firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Cisco firewall.

Cisco refers to this feature as [**Security Intelligence feeds**](https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/objects-object-mgmt.html#ID-2243-00000291), which provide dynamic threat intelligence that can be used in your firewall policies.

### Prerequisites

Before you begin, please ensure your Cisco device supports ingesting blocklists. If you are unsure, please refer to the Cisco documentation or contact Cisco support.
Expand Down
4 changes: 3 additions & 1 deletion crowdsec-docs/unversioned/integrations/f5.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl";

The CrowdSec F5 integration allows you to block malicious IPs in your F5 firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your F5 firewall.

F5 BIG-IP AFM refers to this feature as [**External IP blocklist**](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-per-request-policies/using-http-connector/creating-http-connector-request-external-IP-blocklist.html) or [**Feed lists**](https://techdocs.f5.com/kb/en-us/products/big-ip-afm/manuals/product/big-ip-afm-getting-started-14-1-0/04.html), which allow you to import external threat intelligence to block or allow traffic based on IP reputation.

### Prerequisites

Before you begin, please ensure your F5 device supports ingesting blocklists. If you are unsure, please refer to the F5 documentation or contact F5 support.
Expand Down Expand Up @@ -52,7 +54,7 @@ Once the integration is generated you will be presented with a credentials scree
}}
/>

[F5 Documentation](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-per-request-policies/using-http-connector.html?utm_source=chatgpt.com)
[F5 Documentation](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-per-request-policies/using-http-connector.html)

## Format example

Expand Down
2 changes: 2 additions & 0 deletions crowdsec-docs/unversioned/integrations/fortinet.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl";

The CrowdSec Fortinet integration allows you to block malicious IPs in your Fortinet firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Fortinet firewall.

Fortinet refers to this feature as [**IP address Threat Feeds**](https://docs.fortinet.com/document/fortigate/6.4.5/administration-guide/891236/external-blocklist-policy), which enable you to integrate external threat intelligence sources into your firewall policies.

### Prerequisites

Before you begin, please ensure your Fortinet device supports ingesting blocklists. If you are unsure, please refer to the Fortinet documentation or contact Fortinet support.
Expand Down
4 changes: 3 additions & 1 deletion crowdsec-docs/unversioned/integrations/juniper.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl";

The CrowdSec Juniper integration allows you to block malicious IPs in your Juniper firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Juniper router.

Juniper refers to this feature as [**Security Dynamic Address feeds**](https://www.juniper.net/documentation/us/en/software/nm-apps23.1/policy-enforcer-user-guide/topics/task/dynamic-example.html), which allow you to import and automatically update IP address lists from external feed servers.

### Prerequisites

Before you begin, please ensure your Juniper device supports ingesting blocklists. If you are unsure, please refer to the Juniper documentation or contact Juniper support.
Expand Down Expand Up @@ -52,7 +54,7 @@ Once the integration is generated you will be presented with a credentials scree
}}
/>

[Juniper Documentation JunOS](https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/edit-security-dynamic-address.html)
[Juniper Documentation JunOS](https://www.juniper.net/documentation/us/en/software/nm-apps23.1/policy-enforcer-user-guide/topics/task/dynamic-example.html)

## Configuration Example

Expand Down
2 changes: 2 additions & 0 deletions crowdsec-docs/unversioned/integrations/opnsense.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl";

The CrowdSec OPNsense integration allows you to block malicious IPs in your OPNsense firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your OPNsense firewall.

In OPNsense you'll use **URL Table (IPs) aliases** to create dynamic firewall aliases that automatically update from external URL sources.

### Prerequisites

Before you begin, please ensure your OPNsense software version supports ingesting blocklists (URL aliases). If you are unsure, please refer to the OPNsense documentation or contact OPNsense support.
Expand Down
4 changes: 3 additions & 1 deletion crowdsec-docs/unversioned/integrations/paloalto.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"

The CrowdSec Palo Alto integration allows you to block malicious IPs in your Palo Alto firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Palo Alto firewall.

Palo Alto refers to this feature as [**External Dynamic Lists (EDL)**](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list), which allow you to import and automatically update blocklists from external sources.

### Prerequisites

Before you begin, please ensure your Palo Alto device supports ingesting blocklists. If you are unsure, please refer to the Palo Alto documentation or contact Palo Alto support.
Expand Down Expand Up @@ -99,7 +101,7 @@ You should have your policy created, don't forget to click on ‘commit‘.

![](/img/paloalto_step7.png)

[Palo Alto Documentation](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list#idf36cb80a-77f1-4d17-9c4b-7efe9fe426af)
[Palo Alto Documentation](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list)
[Video Tutorial](https://www.youtube.com/watch?v=QFVI4sOFoaI)

## Format example
Expand Down
2 changes: 2 additions & 0 deletions crowdsec-docs/unversioned/integrations/pfsense.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl";

The CrowdSec pfSense integration allows you to block malicious IPs in your pfSense firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your pfSense firewall.

pfSense you'll use **URL Table (IPs) aliases**, to create aliases that periodically download and update IP lists from external URLs.

### Prerequisites

Before you begin, please ensure your pfSense software version supports ingesting blocklists (URL aliases). If you are unsure, please refer to the pfSense documentation or contact pfSense support.
Expand Down
2 changes: 2 additions & 0 deletions crowdsec-docs/unversioned/integrations/sophos.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl";

The CrowdSec Sophos integration allows you to block malicious IPs in your Sophos firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Sophos firewall.

Sophos refers to this feature as [**Third-Party Threat Feeds**](https://docs.sophos.com/nsg/sophos-firewall/latest/Help/en-us/webhelp/onlinehelp/AdministratorHelp/ActiveThreatResponse/ConfigureFeeds/ThirdPartyThreatFeeds/index.html), which enable you to integrate external sources of IP addresses, domains, and URLs involved in threat activity.

### Prerequisites

Before you begin, please ensure your Sophos device supports ingesting blocklists. If you are unsure, please refer to the Sophos documentation or contact Sophos support.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: Remediation Component Integration Offline
id: issue_integration_rc_offline
---

The **Remediation Component Integration Offline** refers to a [Blocklist-Integration of type Remediation Component](http://localhost:3000/u/integrations/remediationcomponent) has not pulled from its endpoint for more than 24 hours.
The **Remediation Component Integration Offline** refers to a [Blocklist-Integration of type Remediation Component](/u/integrations/remediationcomponent) has not pulled from its endpoint for more than 24 hours.

This issue applies to Remediation Components *(aka bouncers)* directly connected to a **Blocklist integration endpoint** *(aka Blocklist as a Service / BLaaS)*.

Expand Down
Loading