mirror of
https://github.com/opnsense/docs
synced 2024-10-30 21:20:20 +00:00
Deciso: Extended Blocklists: add documentation
This commit is contained in:
parent
a02c338d16
commit
0bd29bb9df
@ -24,6 +24,7 @@ Deciso
|
|||||||
vendor/deciso/opncentral
|
vendor/deciso/opncentral
|
||||||
vendor/deciso/opnproxy
|
vendor/deciso/opnproxy
|
||||||
vendor/deciso/opnwaf
|
vendor/deciso/opnwaf
|
||||||
|
vendor/deciso/extended_dnsbl
|
||||||
|
|
||||||
--------------------
|
--------------------
|
||||||
Sunnyvalley
|
Sunnyvalley
|
||||||
|
95
source/vendor/deciso/extended_dnsbl.rst
vendored
Normal file
95
source/vendor/deciso/extended_dnsbl.rst
vendored
Normal file
@ -0,0 +1,95 @@
|
|||||||
|
===========================
|
||||||
|
Deciso: Extended Blocklists
|
||||||
|
===========================
|
||||||
|
|
||||||
|
As part of the OPNsense Business Edition, Deciso offers the extended blocklists module as
|
||||||
|
part of the standard Business Edition installation. With this module you are able
|
||||||
|
to configure DNS blocking policies in a more fine-grained manner by specifying networks on which the blocklists
|
||||||
|
should apply.
|
||||||
|
|
||||||
|
The extended blocklists can be found under :menuselection:`Services->Unbound DNS->Extended Blocklists`.
|
||||||
|
|
||||||
|
Blocklists
|
||||||
|
----------------------------
|
||||||
|
|
||||||
|
Blocklists are configured in the same manner as with regular blocklists, except they are listed
|
||||||
|
in a grid, where multiple blocklists and multiple networks may be defined per grid entry to ease administration
|
||||||
|
for a large amount of networks. An optional description may be provided for your own reference.
|
||||||
|
|
||||||
|
Source networks are provided as IP addresses in CIDR notation, or singular IP addresses. The validation
|
||||||
|
for this field is strict, meaning that setting host bits in a CIDR notation is not allowed.
|
||||||
|
|
||||||
|
.. Note::
|
||||||
|
|
||||||
|
If you'd like to use the extended blocklists module, keep in mind that the regular blocklists, if configured,
|
||||||
|
are still active. They define a policy for all networks, and are given preference above the extended blocklists.
|
||||||
|
Therefore it's possible that a conflict arises between blocklists for a specific network and regular blocklists.
|
||||||
|
Please verify that the relevant blocklists are not configured in :menuselection:`Services->Unbound DNS->Blocklist`.
|
||||||
|
|
||||||
|
If you're not sure if a policy would overlap in this manner, please use the tester as described below.
|
||||||
|
|
||||||
|
Custom
|
||||||
|
----------------------------
|
||||||
|
|
||||||
|
In the Custom tab you are able to configure custom domains to block, also per source network. The domains can either
|
||||||
|
be exact matches, or entered as a wildcard in a separate field. Wildcard entries will block every subdomain of
|
||||||
|
the configured domain name. It's not possible to block a first-level domain such as 'com'.
|
||||||
|
|
||||||
|
To prevent cluttering in the grid, the relevant domains and wildcards are not shown in the grid. Therefore
|
||||||
|
it's mandatory to add a description for your own reference so you can easily locate a custom policy. You can view
|
||||||
|
the blocked domains/wildcards by clicking "edit" on the grid entry.
|
||||||
|
|
||||||
|
|
||||||
|
Tester
|
||||||
|
----------------------------
|
||||||
|
|
||||||
|
If you'd like to verify whether a specified domain is correctly being blocked, or if you want to know
|
||||||
|
if a domain is part of a specific list, you can use the tester to see the policy that's applied to a DNS request.
|
||||||
|
Here you're able to enter a domain, as well as a source IP address to simulate a request from a specific address.
|
||||||
|
Note that no actual DNS request is sent if a domain were to pass, it's kept isolated as part of the blocklisting mechanism.
|
||||||
|
|
||||||
|
It's also possible to verify whether a domain overlaps with another policy. For example, if you configured the facebook blocklist,
|
||||||
|
the output would look something like this:
|
||||||
|
|
||||||
|
.. code-block:: json
|
||||||
|
|
||||||
|
{
|
||||||
|
"status": "OK",
|
||||||
|
"action": "Block",
|
||||||
|
"policy": {
|
||||||
|
"bl": "ext_blf0",
|
||||||
|
"wildcard": false,
|
||||||
|
"source_net": [
|
||||||
|
"192.168.2.0/24",
|
||||||
|
"192.168.1.0/24",
|
||||||
|
"10.0.0.0/8"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
However, if you also enabled the facebook blocklist in the regular blocklist section, you would get:
|
||||||
|
|
||||||
|
.. code-block:: json
|
||||||
|
|
||||||
|
{
|
||||||
|
"status": "OK",
|
||||||
|
"action": "Block",
|
||||||
|
"policy": {
|
||||||
|
"bl": "blf0",
|
||||||
|
"wildcard": false,
|
||||||
|
"collisions": [
|
||||||
|
{
|
||||||
|
"bl": "ext_blf0",
|
||||||
|
"wildcard": false,
|
||||||
|
"source_net": [
|
||||||
|
"192.168.2.0/24",
|
||||||
|
"192.168.1.0/24",
|
||||||
|
"10.0.0.0/8"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source_net": []
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
which would tell you that a regular list is conflicting with an extended blocklist policy.
|
Loading…
Reference in New Issue
Block a user