Creating Security Rules (firewall)

Actionable Results!

You have investigated the traffic, detected anomalies and created notes for further investigation. What is next? Not every case investigation is carried out by a crowd team. As a security analyst, there will be some cases you need to spot the anomaly, identify the source and take action. Wireshark is not all about packet details; it can help you to create firewall rules ready to implement with a couple of clicks. You can create firewall rules by using the "Tools --> Firewall ACL Rules" menu. Once you use this feature, it will open a new window and provide a combination of rules (IP, port and MAC address-based) for different purposes. Note that these rules are generated for implementation on an outside firewall interface.

Currently, Wireshark can create rules for:

  • Netfilter (iptables)

  • Cisco IOS (standard/extended)

  • IP Filter (ipfilter)

  • IPFirewall (ipfw)

  • Packet filter (pf)

  • Windows Firewall (netsh new/old format)

Last updated