At this moment we have policy compilers for IPTables and NFTables, but we have in mind the option for generate compilers for other packet filtering options.
It is not possible at this moment, but we will evaluate it for a future release.
The FWCloud policy management script is installed in the destination firewall into the folder `/etc/fwcloud` and with the name `fwcloud.sh`
You can manage the policy using systemd:
systemctl stop fwcloud
systemctl...
I think that you could do it using a hook script rule.
For example, you can generate a hook script rule that inserts code for update git after each policy load. If the script doesn't changes, the git command will do nothing because you don't have any pending changes.
Yes, you are right, it is an interesting feature for avoid blocking the management access from the FWCloud console.
I have created a GitHub issue for implement it in the next release.
Thank you very much for your feed back.
You can reuse it for nodes in the same cluster, but not reuse rules or group rules for different firewalls.
We can evaluate it as a future feature, but I can not grant you that we will implement it because complicates quite a lot the logic of the application.
As you can see in the Docker subsection of the FWCloud installation documentation, you must use HTTPS protocol for access your dockerized FWCloud instance.
FWCloud is a security management application, then, the communication with it must be secure too ;-)
Which is the URL that you are using for access the FWCloud Docker instance?
Are you using https://localhost:3030?
You have to connect using the HTTS protocol.
Fail2Ban and CrowdSec compatibility is independent of the method (ssh or FWCloud-Agent) used to apply the firewall policy into the destination firewall/cluster.
Then, if you enable the compatibility flag, it will go for both, ssh and FWCloud-Agent communication.
Hi,
Not yet, but we have in our roadmap adding new features to the FWCloud-Agent that will allow a better integration with Fail2Ban and CrowdSec.
For example, we have an issue for allow that from the user interface you can query the list of IPs in the CrowdSec blacklist set.
Another thing that...
We are very proud to announce the availability of FWCloud-API 1.5.1 and FWCloud-UI 1.4.0, the main packages of the FWCloud project, with lot of new features, performance improvements and bug fixes.
This version brings new amazing features like hook scripts rules that will simplify the insertion...
We have just created a new documentation section in the FWCloud website where we explain how to use FWCloud for manage a firewall that has docker images running.
Go here for access this document.
FWCloud-Agent is used for manage the firewall in which it is installed. If you want to use it in a Docker container, you will have to generate a new Docker image with FWCloud-Agent installed in it.
Hi Kai,
This kind of rules are for traffic accounting purposes.
For example, imagine that you want to create a Grafana graphic for account all the web traffic (http and https) that goes through your firewall. For it you can create an accounting rule like this in the FORWARD chain of your...
We are very proud to announce the availability of FWCloud Docker, a dockerized version that will simplify very much the deployment and maintenance of any FWCloud platform. We have even prepared a Docker Compose file that you can use for have running a full operational FWCloud console in a matter...
Hi again,
Do you know about the FWCloud hook scripts feature?
You can see here a video tutorial about it.
Maybe you can use this feature for apply GEO restrictions until we have it implemented into FWCloud.
I'm sorry but not at this moment.
We want create a new section in our website for it.
FYI, at this moment we are working in these main feature that will be available soon in next releases:
- Docker, CrowdSec and Fail2Ban compatibility.
- 2FA.
- FWCloud SaaS.
- Audit logs.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.