When certain features are on, you can use the following links to validate if the features are working properly.
Ad Block
Check if you can see ads on this site https://ads-blocker.com/testing/
If you are using strict mode, you may need to check the blocked rate here. https://d3ward.github.io/toolz/adblock.html
Family - Family Protect
Visite this site to test Family Protect. http://welcome.opendns.com/
Family - Safe Search
Search 'porn' in Google search with SafeSearch on. It should work if you see different results as SafeSearch off. You may need to do it in incognito window.
Family - Social Hour
DNS - DNS over HTTPS
Cloudflare: https://1.1.1.1/help
DNS - Unbound
https://dnsleaktest.com/ Run a standard test, If the IP in the test result is your public IP, it means unbound is enabled.
https://en.internet.nl/ Start a test on "Test your connection", and check whether or not domain signatures (DNSSEC) are validated and you are protected against false translation from signed domain names into rogue IP addresses.
Malware Activity - Alarm
Note: some tests may require you to clear DNS cache (turn off and on wifi usually can clear this)
# Expect an alarm will be generated.
http://malware.wicar.org/data/eicar.com
# Expect an alarm will be generated.
http://examplebotnetdomain.com
These are just test files (no real damage), your browser may stop you from downloading the test malware file, so to test it, you will have to accept the risk in the browser to continue downloading.
or you can access these URLs via command line:
$ curl http://malware.wicar.org/data/eicar.com
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
$ curl http://examplebotnetdomain.com
Note: Sometimes you may need to download multiple times, as the test file is too small to trigger the threshold.
Note: some tests may require you to clear DNS cache (turn off and on wifi usually can clear this)
Malware Activity - Strict Mode (1.973 or higher)
By default, Firewalla auto blocks high-risk malware sites. To extend it to broader malware sites including non-high-risk malware sites, you need to turn on the strict mode in Active Protect. This requires box version 1.973 or above.
Note: some tests may require you to clear DNS cache (turn off and on wifi usually can clear this)
Once it's in strict mode, use your browser to visit these sites:
# Expect an alarm will be generated.
http://malware.wicar.org/data/eicar.com
# Expect an auto block alarm will be generated
http://examplebotnetdomain.com
These are just test files (no real damage), your browser may stop you from downloading the test malware file, so to test it, you will have to accept the risk in the browser to continue downloading.
or you can access these URLs via command line:
$ curl http://malware.wicar.org/data/eicar.com
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
$ curl http://examplebotnetdomain.com
curl: (6) Could not resolve host: examplebotnetdomain.com
Note: Sometimes you may need to download multiple times, as the test file is too small to trigger the threshold.
Video Sites Blocking Rule
Try to play youtube videos
Comments
0 comments
Please sign in to leave a comment.