You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/user_guides/use_cases/blaas_to_firewall.mdx
+94-3Lines changed: 94 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,8 +5,99 @@ sidebar_position: 10
5
5
tags: [blaas,firewall,usecase]
6
6
---
7
7
8
-
9
-
what we want to achieve,
8
+
/* what we want to achieve,
10
9
technicailty score: overall and per section
11
10
required skills
12
-
estimated time
11
+
estimated time
12
+
*/
13
+
14
+
# **Use Case: Integrating CrowdSec Blocklists Directly Into Your Firewall**
15
+
16
+
## **What We Want to Achieve**
17
+
Enhance your firewall’s protection by integrating CrowdSec’s **"Blocklist as a Service" (BLaaS)** feature. This service provides a dynamically updated list of malicious IPs and ranges from selected blocklists, hosted on an endpoint with basic authentication. By leveraging this integration, your firewall will proactively block known malicious actors, reducing attack surface and risk.
18
+
19
+
---
20
+
21
+
## **Prerequisites**
22
+
Before starting, ensure you meet the following requirements:
23
+
24
+
1.**Firewall Capabilities**:
25
+
- Your firewall supports creating rules from an IP or CIDR list hosted on a given endpoint.
26
+
- The list must be accessible via **basic authentication**.
27
+
28
+
2.**BLaaS Integration**:
29
+
- You have a valid CrowdSec BLaaS configuration, exposing the merged blocklist endpoint.
30
+
- Ensure the blocklists attached to this integration match your security policies.
### 3. **Integrate Blocklists Into Your Firewall**
88
+
- Configure your firewall to fetch the list at regular intervals.
89
+
- Apply rules to enforce blocking based on the retrieved IPs and CIDRs.
90
+
- Example configurations for common firewalls are available in the [Firewall Integration Guide](https://doc.crowdsec.net/docs/using-crowdsec/firewall/).
91
+
92
+
### 4. **Test and Verify**
93
+
- Simulate traffic from a blocked IP to verify that the firewall correctly applies the rules.
94
+
- Review logs to ensure legitimate traffic isn’t inadvertently blocked.
95
+
96
+
### 5. **Automate and Maintain**
97
+
- Schedule periodic updates for the blocklist (e.g., cron jobs for API pulls).
98
+
- Monitor the firewall and CrowdSec logs for performance and effectiveness.
99
+
- Refer to [Monitoring Best Practices](https://doc.crowdsec.net/docs/monitoring/overview/).
100
+
101
+
---
102
+
103
+
By integrating CrowdSec’s "Blocklist as a Service" into your firewall, you gain access to dynamic, community-powered threat intelligence that keeps your infrastructure secure. For more detailed configuration examples and troubleshooting, explore the [CrowdSec Documentation](https://doc.crowdsec.net/).
0 commit comments