mirror of
https://github.com/opnsense/docs.git
synced 2025-12-10 14:33:13 -06:00
Security: Q-Feeds Connect - add initial documentation. (#785)
This commit is contained in:
parent
c484b6dfaf
commit
56e6e65074
167
source/manual/qfeeds.rst
Normal file
167
source/manual/qfeeds.rst
Normal file
@ -0,0 +1,167 @@
|
||||
=================================================================
|
||||
Q-Feeds connector
|
||||
=================================================================
|
||||
|
||||
.. contents:: Index
|
||||
|
||||
--------------------------------------
|
||||
Introduction
|
||||
--------------------------------------
|
||||
|
||||
In today's world, keeping your network secure is super important. Next Generation Firewalls (NGFWs) are essential
|
||||
tools for protecting your network. They can filter DNS and web traffic using external dynamic lists of threat
|
||||
indicators, known as Indicators of Compromise (IoCs).
|
||||
|
||||
Q-Feeds provides dynamic, up-to-date lists of these IoCs, designed specifically for use with security controls like
|
||||
NGFWs. By integrating Q-Feeds into your OPNsense firewall, you can improve your network's protection against
|
||||
new and emerging threats. This means your firewall can automatically block harmful traffic and stay updated with
|
||||
the latest threat information.
|
||||
|
||||
Two types of lists are supported by this plugin, IPs using firewall aliases and domains using an integration with our
|
||||
unbound blocklists.
|
||||
|
||||
This document exaplains how to install and use Q-Feeds on your OPNsense firewall.
|
||||
|
||||
--------------------------------------
|
||||
External resources
|
||||
--------------------------------------
|
||||
|
||||
In order to use Q-Feeds, a (free or paid) subscription is required. Please visit `https://qfeeds.com/opnsense/ <https://qfeeds.com/opnsense/>`__
|
||||
for more information and to sign up for access.
|
||||
The differences between available service offerings and extensive documentation is available there as well.
|
||||
|
||||
--------------------------------------
|
||||
Installation
|
||||
--------------------------------------
|
||||
|
||||
Installation of this plugin is rather easy, go to :menuselection:`System --> Firmware --> Plugins` and search for **os-q-feeds-connector**,
|
||||
use the [+] button to install it.
|
||||
|
||||
Next go to :menuselection:`Security --> Q-Feeds Connect` to configure the service.
|
||||
|
||||
|
||||
|
||||
--------------------------------------
|
||||
Activate the plugin
|
||||
--------------------------------------
|
||||
|
||||
To activate the plugin please go to :menuselection:`Security --> Q-Feeds Connect`.
|
||||
The settings page of the Q-Feeds plugin will now open and it asks for an API token.
|
||||
|
||||
You can obtain this token by register an account on our Threat Intelligence Portal (`https://tip.qfeeds.com <https://tip.qfeeds.com>`__).
|
||||
|
||||
|
||||
After you've registered an account and logged in, on the dashboard you will find the **Manage API Keys** page. On
|
||||
this page click **Create Free API Key**.
|
||||
|
||||
Copy the API token into the settings page of the plugin on your OPNsense appliance.
|
||||
Click Apply and the plugin will start fetching the Threat Intelligence and create firewall aliases.
|
||||
|
||||
|
||||
--------------------------------------
|
||||
Menu options
|
||||
--------------------------------------
|
||||
|
||||
The (configuration) options available via the plugin can be accessed via a set of tabs in :menuselection:`Security --> Q-Feeds Connect`.
|
||||
Below you will find their purpose.
|
||||
|
||||
.. tabs::
|
||||
|
||||
.. tab:: Setting
|
||||
|
||||
Subscription configuration
|
||||
|
||||
========================================= ====================================================================================
|
||||
**Option** **Description**
|
||||
========================================= ====================================================================================
|
||||
**//General Settings**
|
||||
**API key** The API key needed to access Q-Feeds.
|
||||
**Register domain feeds** Use domain feeds in Unbound DNS blocklist,
|
||||
requires blocklists to be enabled in order to have effect
|
||||
========================================= ====================================================================================
|
||||
|
||||
.. tab:: Feeds
|
||||
|
||||
Shows subscription status.
|
||||
|
||||
========================================= ====================================================================================
|
||||
**Field** **Description**
|
||||
========================================= ====================================================================================
|
||||
Description Name of the list
|
||||
Type IP (firewall rules), domain (DNS, Unbound)
|
||||
Updated at Last updated at (iso date)
|
||||
Next update Scheduled to be updated again at (iso date)
|
||||
Licensed Valid license on this list installed
|
||||
========================================= ====================================================================================
|
||||
|
||||
.. tab:: Events
|
||||
|
||||
When firewall rules are being send to the log, you can gather a list of events that took place for items in the firewall table.
|
||||
|
||||
========================================= ====================================================================================
|
||||
**Field** **Description**
|
||||
========================================= ====================================================================================
|
||||
Timestamp Time the event occured
|
||||
Interface Which interface it was logged on
|
||||
Direction Did this concern in(bound) or out(bound) traffic
|
||||
Source Source IP address
|
||||
Destination Destination IP address
|
||||
========================================= ====================================================================================
|
||||
|
||||
|
||||
|
||||
--------------------------------------
|
||||
Firewall setup
|
||||
--------------------------------------
|
||||
|
||||
In order to block traffic originating or going to addresses on the list, you will need firewall rules.
|
||||
The most simple scenario would drop traffic coming from :code:`lan` going to items in our list or entering via :code:`wan`
|
||||
originating from entries in the list.
|
||||
|
||||
From LAN:
|
||||
|
||||
==================================== ============================================== ===================================================
|
||||
Parameter Value Short description
|
||||
==================================== ============================================== ===================================================
|
||||
Action :code:`Block` Drop packets silently
|
||||
Interface :code:`LAN` Traffic on the LAN interface
|
||||
TCP/IP Version :code:`IPV4/IPV6` Both protocols are supported
|
||||
Direction :code:`in` By default we filter on inbound traffic
|
||||
Destination :code:`__qfeeds_malware_ip` The QFeeds offered malware locations
|
||||
Logging :code:`checked` With logging enabled, you can track offenders
|
||||
==================================== ============================================== ===================================================
|
||||
|
||||
From WAN:
|
||||
|
||||
==================================== ============================================== ===================================================
|
||||
Parameter Value Short description
|
||||
==================================== ============================================== ===================================================
|
||||
Action :code:`Block` Drop packets silently
|
||||
Interface :code:`LAN` Traffic on the LAN interface
|
||||
TCP/IP Version :code:`IPV4/IPV6` Both protocols are supported
|
||||
Direction :code:`in` By default we filter on inbound traffic
|
||||
Source :code:`__qfeeds_malware_ip` The QFeeds offered malware locations
|
||||
Logging :code:`checked` With logging enabled, you can track offenders
|
||||
==================================== ============================================== ===================================================
|
||||
|
||||
|
||||
.. Note::
|
||||
|
||||
Only non default rule settings which are offered in the tables above. More information about using firewall rules and aliases
|
||||
can be found in the :doc:`Firewall </firewall>` section.
|
||||
|
||||
--------------------------------------
|
||||
DNS/Domain blocking using Unbound
|
||||
--------------------------------------
|
||||
|
||||
.. Note::
|
||||
|
||||
In order to make us of DNS based logging you need to configure Unbound as your primary DNS server. More
|
||||
information on how to configure this can be found :doc:`here </manual/unbound>`
|
||||
|
||||
|
||||
In :menuselection:`Security --> Q-Feeds Connect` make sure to enable **"Register domain feeds"** and hit Apply.
|
||||
Before you can use the block list, also make sure Unbound Blocklists are enabled in :menuselection:`Services --> Unbound DNS --> Blocklist`.
|
||||
|
||||
When both are enabled, you can use :menuselection:`Reporting --> Unbound DNS` to gain insights into the requested domains.
|
||||
|
||||
@ -91,6 +91,7 @@ Other
|
||||
manual/relayd
|
||||
manual/wazuh-agent
|
||||
manual/how-tos/tor
|
||||
manual/qfeeds
|
||||
|
||||
----------------
|
||||
Reporting
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user