root@R9000:/$ aegis update -v
aegis 1.1.4 - Verbose mode
Initializing...
- 'firewall-start.sh' is in place and ok.
- 'aegis' is installed on external drive.
- 'post-mount.sh' is in place and ok.
Updating blocklist from sources...
- Downloading lists defined in /opt/bolemo/etc/aegis.sources
1)
https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset
- 100%[===================>] 41.85K --.-KB/s in 0.02s
2)
https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level2.netset
- 100%[===================>] 61.39K --.-KB/s in 0.003s
3)
https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level3.netset
- 100%[===================>] 261.78K --.-KB/s in 0.02s
4)
https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/iblocklist_ciarmy_malicious.netset
- 100%[===================>] 201.62K --.-KB/s in 0.01s
5)
https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/malwaredomainlist.ipset
- 100%[===================>] 14.49K --.-KB/s in 0.001s
- Optimizing and reducing netset (using iprange)...
- Done.
Building ipset blocklist (34200 entries blocking 619480728 ips)...
- Created blocklist, swapping it.
- Done.
- Internal firewall does not need to be restarted.
Status:
- 'aegis' version: 1.1.4
- 'iprange' is installed: iprange 1.0.4
- 'aegis' is set and active for WAN interface (brwan).
- Filtering 619480728 IP adresses.
- WAN gateway IP range does not need to be bypassed.
- Logging is on.
Detailed status:
- 'firewall-start.sh' exists with correct settings.
- 'post-mount.sh' exists with correct settings.
- Actual router time: 2020-10-20 16:48:14
- Blocklist generation time: 2020-10-20 16:48:14
- Router firewall was last started 2020-10-20 16:48:14:
ipset blocklist was already loaded.
iptables logging rules were set.
iptables WAN rules were set.
- iptables rules are set:
WAN interface rules are set
iptables -N aegis_dst
iptables -N aegis_src
iptables -A INPUT -i brwan -m set --match-set aegis_bl src -j aegis_src
iptables -A FORWARD -i brwan -m set --match-set aegis_bl src -j aegis_src
iptables -A FORWARD -o brwan -m set --match-set aegis_bl dst -j aegis_dst
iptables -A OUTPUT -o brwan -m set --match-set aegis_bl dst -j aegis_dst
iptables -A aegis_dst -j LOG --log-prefix "[aegis] "
iptables -A aegis_dst -j DROP
iptables -A aegis_src -j LOG --log-prefix "[aegis] "
iptables -A aegis_src -j DROP
- Logging is active.
- ipset blocklist is set:
Name: aegis_bl
Type: hash:net
Revision: 6
Header: family inet hashsize 16384 maxelem 34200
Size in memory: 860268
References: 4
Number of entries: 34200
- ipset whitelist is not set.
- ipset WAN gateway bypass is not set.
root@R9000:/$