And apparently there is also a FireHOL Level4 here: https://iplists.firehol.org/?ipset=firehol_level4And the list is here: https://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/firehol_level4.netset
Completely random thought: checking the list against existing ET Open rules, pruning duplicates.Another thought: integration with Suricata to not only block on those IPs, but also alert.
Quote from: mimugmail on June 09, 2020, 07:26:25 amQuote from: hushcoden on June 08, 2020, 11:14:22 pmExpiration Days: 1 --> with this you shouldn't need a cron job, is that right ?On LAN you create a rule with protocol any, source LAN, destination you FireHOL alias and condition drop. On WAN the same rule but source is your Alias and destination ANY (to match port forward and connections to firewall itself)That's great thanks: there is no 'drop' in the drop-down menu, I can chose between 'block' or 'reject', which one is the best approach?Also, as for the LAN rule, do I have to chose 'LAN' in the interface section only or for both interface and source ?Tia.
Quote from: hushcoden on June 08, 2020, 11:14:22 pmExpiration Days: 1 --> with this you shouldn't need a cron job, is that right ?On LAN you create a rule with protocol any, source LAN, destination you FireHOL alias and condition drop. On WAN the same rule but source is your Alias and destination ANY (to match port forward and connections to firewall itself)
Expiration Days: 1 --> with this you shouldn't need a cron job, is that right ?
Many thanks, found it in System --> Log Files --> GeneralI've attached a screenshot: does fetch mean it's been updated ?
1) block is better since with reject the Firewall has to generate a packet (cost cpu cycle)2)+3) Interface LAN, Source LAN net, direction ALWAYS *IN*, never use out ..
2 rules source any, destination firehol and vice versa. No Interface selected