You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There are two ways to get started with Blocklists:
8
+
There are two main paths to integrate CrowdSec blocklists into your infrastructure:
9
9
10
-
1.**Security Engine** - Use the CrowdSec Security Engine to ingest blocklists
11
-
2.**Integrations** - Use Integrations to ingest blocklists into firewall, CDN, or other security solutions
10
+
1.**Security Engine** - If you already have a CrowdSec Security Engine, you can use it to ingest blocklists
11
+
2.**Integrations** - For a purely SaaS approach, use Integrations to ingest blocklists into firewall, CDN, (...) via our Blockist as a Service Integrations endpoints
12
12
13
13
Depending on which path you take you can start with the following guides:
14
14
15
+
# Security Engine Ingestion
16
+
If you already have security engines and remediation components installed in your infrastructure, you can follow the guide bellow.
description="The CrowdSec Security Engine is a powerful, open-source software for detecting and blocking malicious IPs, safeguarding both infrastructure and application security."
18
21
image="Hero Security Engine.png"
19
22
link="/u/blocklists/security_engine"
20
23
/>
21
-
<br/>
24
+
25
+
# SaaS Integration
26
+
If you want to use blocklists without installing the CrowdSec Security Engine you can follow the guide bellow.
22
27
<ConsolePromo
23
28
title="Integrations"
24
29
description="A seemless way to integrate CrowdSec blocklists into your existing firewall, CDN, or other security solutions."
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/blocklists/intro.md
+7-3
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,16 @@
1
1
---
2
2
id: intro
3
-
title: Introduction
3
+
title: CrowdSec Blocklists - Proactively defend your perimeter
4
4
sidebar_position: 2
5
5
---
6
6
7
-
## Objective
7
+
CrowdSec's Blocklist regroup IPs and ranges that have been **validated** as performing **malicious behaviors** on **exposed endpoints**.
8
+
Those blocklists are kept up to date and are currated to ensure they don't contain false positives.
9
+
Their are meant to be directly actionable to protect your perimeter from thousands of known attackers.
10
+
The unique nature of CrowdSec's network, by its diversity and size brings unmatched exclusivity and quality.
8
11
9
-
Welcome to the documentation section dedicated to CrowdSec's Blocklists. This section will outline what Blocklists are, how they work, and how you can use them to protect your systems.
12
+
13
+
This section will help you understand the nature of our different blocklists, how they work, and how you can use them to protect your systems.
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/user_guides/use_cases/blaas_to_firewall.mdx
+5-92
Original file line number
Diff line number
Diff line change
@@ -35,96 +35,9 @@ For this use case, you will need to:
35
35
++ Test that it works and evaluate performance
36
36
++ Scale and Automate >> SAPI >> centralize your own blokclists ++ link to other use cases
37
37
38
+
--------
38
39
39
-
//////////// GPT generated
40
-
41
-
# **Use Case: Integrating CrowdSec Blocklists Directly Into Your Firewall**
42
-
43
-
## **What We Want to Achieve**
44
-
Enhance your firewall’s protection by integrating CrowdSec’s **"Blocklist as a Service" (BLaaS)** feature. This service provides a dynamically updated list of malicious IPs and ranges from selected blocklists, hosted on an endpoint with basic authentication. By leveraging this integration, your firewall will proactively block known malicious actors, reducing attack surface and risk.
45
-
46
-
---
47
-
48
-
## **Prerequisites**
49
-
Before starting, ensure you meet the following requirements:
50
-
51
-
1.**Firewall Capabilities**:
52
-
- Your firewall supports creating rules from an IP or CIDR list hosted on a given endpoint.
53
-
- The list must be accessible via **basic authentication**.
54
-
55
-
2.**BLaaS Integration**:
56
-
- You have a valid CrowdSec BLaaS configuration, exposing the merged blocklist endpoint.
57
-
- Ensure the blocklists attached to this integration match your security policies.
### 3. **Integrate Blocklists Into Your Firewall**
115
-
- Configure your firewall to fetch the list at regular intervals.
116
-
- Apply rules to enforce blocking based on the retrieved IPs and CIDRs.
117
-
- Example configurations for common firewalls are available in the [Firewall Integration Guide](https://doc.crowdsec.net/docs/using-crowdsec/firewall/).
118
-
119
-
### 4. **Test and Verify**
120
-
- Simulate traffic from a blocked IP to verify that the firewall correctly applies the rules.
121
-
- Review logs to ensure legitimate traffic isn’t inadvertently blocked.
122
-
123
-
### 5. **Automate and Maintain**
124
-
- Schedule periodic updates for the blocklist (e.g., cron jobs for API pulls).
125
-
- Monitor the firewall and CrowdSec logs for performance and effectiveness.
126
-
- Refer to [Monitoring Best Practices](https://doc.crowdsec.net/docs/monitoring/overview/).
127
-
128
-
---
129
-
130
-
By integrating CrowdSec’s "Blocklist as a Service" into your firewall, you gain access to dynamic, community-powered threat intelligence that keeps your infrastructure secure. For more detailed configuration examples and troubleshooting, explore the [CrowdSec Documentation](https://doc.crowdsec.net/).
40
+
[] Move u/integrations/ to u/console/blaas_integrations/
0 commit comments