Q-Feeds connector
Index
Introduction
In today’s world, keeping your network secure is super important. Next Generation Firewalls (NGFWs) are essential tools for protecting your network. They can filter DNS and web traffic using external dynamic lists of threat indicators, known as Indicators of Compromise (IoCs).
Q-Feeds provides dynamic, up-to-date lists of these IoCs, designed specifically for use with security controls like NGFWs. By integrating Q-Feeds into your OPNsense firewall, you can improve your network’s protection against new and emerging threats. This means your firewall can automatically block harmful traffic and stay updated with the latest threat information.
Two types of lists are supported by this plugin, IPs using firewall aliases and domains using an integration with our unbound blocklists.
This document exaplains how to install and use Q-Feeds on your OPNsense firewall.
External resources
In order to use Q-Feeds, a (free or paid) subscription is required. Please visit https://qfeeds.com/opnsense/ for more information and to sign up for access. The differences between available service offerings and extensive documentation is available there as well.
Installation
Installation of this plugin is rather easy, go to
and search for os-q-feeds-connector, use the [+] button to install it.Next go to
to configure the service.Activate the plugin
To activate the plugin please go to
. The settings page of the Q-Feeds plugin will now open and it asks for an API token.You can obtain this token by register an account on our Threat Intelligence Portal (https://tip.qfeeds.com).
After you’ve registered an account and logged in, on the dashboard you will find the Manage API Keys page. On this page click Create Free API Key.
Copy the API token into the settings page of the plugin on your OPNsense appliance. Click Apply and the plugin will start fetching the Threat Intelligence and create firewall aliases.
Firewall setup
In order to block traffic originating or going to addresses on the list, you will need firewall rules.
The most simple scenario would drop traffic coming from lan
going to items in our list or entering via wan
originating from entries in the list.
From LAN:
Parameter |
Value |
Short description |
---|---|---|
Action |
|
Drop packets silently |
Interface |
|
Traffic on the LAN interface |
TCP/IP Version |
|
Both protocols are supported |
Direction |
|
By default we filter on inbound traffic |
Destination |
|
The QFeeds offered malware locations |
Logging |
|
With logging enabled, you can track offenders |
From WAN:
Parameter |
Value |
Short description |
---|---|---|
Action |
|
Drop packets silently |
Interface |
|
Traffic on the LAN interface |
TCP/IP Version |
|
Both protocols are supported |
Direction |
|
By default we filter on inbound traffic |
Source |
|
The QFeeds offered malware locations |
Logging |
|
With logging enabled, you can track offenders |
Note
Only non default rule settings which are offered in the tables above. More information about using firewall rules and aliases can be found in the Firewall section.
DNS/Domain blocking using Unbound
Note
In order to make us of DNS based logging you need to configure Unbound as your primary DNS server. More information on how to configure this can be found here
In
make sure to enable “Register domain feeds” and hit Apply. Before you can use the block list, also make sure Unbound Blocklists are enabled in .When both are enabled, you can use
to gain insights into the requested domains.