Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

active response script for nftables #2029

Merged
merged 1 commit into from
Jan 14, 2022

Conversation

ChristianBeer
Copy link
Contributor

Does the same as firewall-drop.sh and firewalld-drop.sh but for nftables (default in Debian 10+). Needs a bit more steps to setup but does a very good job.
Documentation should be updated to contain maybe an example for the nftables configuration.

Tested on Debian 11 with IPv4 and IPv6 adresses.

Does the same as firewall-drop.sh and firewalld-drop.sh but for nftables (default in Debian 10+). Needs a bit more steps to setup but does a very good job.
Documentation should be updated to contain maybe an example for the nftables configuration.

Tested on Debian 11 with IPv4 and IPv6 adresses.
ChristianBeer added a commit to ChristianBeer/ossec-docs that referenced this pull request Dec 26, 2021
@atomicturtle
Copy link
Member

Thanks for the PR, this is great work!

@atomicturtle atomicturtle merged commit 818b28c into ossec:master Jan 14, 2022
@ChristianBeer ChristianBeer deleted the ar-nftables-script branch January 19, 2022 21:05
@ChristianBeer
Copy link
Contributor Author

@atomicturtle Thanks for including this in the 3.7.0 release. Don't forget to merge the documentation PR too as this contains a useful config snippet.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants