suricata: Scan outgoing traffic, too
Commit Message
Connections from the firewall and through the proxy must be filtered, too
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
---
src/initscripts/system/firewall | 1 +
1 file changed, 1 insertion(+)
Comments
Hello Michael,
thanks for the patch - merged!
Best regards,
-Stefan
> Connections from the firewall and through the proxy must be filtered,
> too
>
> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
> ---
> src/initscripts/system/firewall | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/src/initscripts/system/firewall
> b/src/initscripts/system/firewall
> index 9a79cb1..a4fcee2 100644
> --- a/src/initscripts/system/firewall
> +++ b/src/initscripts/system/firewall
> @@ -189,6 +189,7 @@ iptables_init() {
> iptables -N IPS
> iptables -A INPUT -j IPS
> iptables -A FORWARD -j IPS
> + iptables -A OUTPUT -j IPS
>
> # Block non-established IPsec networks
> iptables -N IPSECBLOCK
@@ -189,6 +189,7 @@ iptables_init() {
iptables -N IPS
iptables -A INPUT -j IPS
iptables -A FORWARD -j IPS
+ iptables -A OUTPUT -j IPS
# Block non-established IPsec networks
iptables -N IPSECBLOCK