Actions
Feature #8281
closedAdd reject as a default action for firewall mode
Status:
Rejected
Priority:
Normal
Assignee:
-
Target version:
-
Effort:
Difficulty:
Label:
Needs Suricata-Verify test, Needs backport to 8.0
Description
Currently firewall mode has a built-in behavior where it will drop by default on no rule-matches - https://docs.suricata.io/en/latest/firewall/firewall-design.html. There are many users that would prefer to have a default fail-close behavior that results in a reject action being applied rather than a drop, which would mean Suricata would send a TCP reset, similarly to how matches on reject rules for IPS/IDS rules work in non-firewall mode. The ask here is to add a yaml-level configuration for setting the default action for firewall mode and being able to specify that to be either DROP or REJECT.
Updated by Victor Julien 17 days ago
- Is duplicate of Feature #7701: firewall: configurable default policies added
Updated by Victor Julien 17 days ago
- Status changed from New to Rejected
- Target version deleted (
TBD)
Closing as duplicate of #7701
Actions