User Tools

Site Tools


infoblox:best_practice

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
infoblox:best_practice [2024/04/03 17:01] bstaffordinfoblox:best_practice [2025/12/09 09:33] (current) – [DNS] bstafford
Line 1: Line 1:
-====== InfoBlox Best Practice ======+====== Infoblox Best Practice ====== 
 +If you are configuring a dual-stack network for the host, you must set the minimum MTU value for the IPv4 address to 1280; if you do not, the IPv6 address will not be functional.  
 +===== NIST Best Practice for DNS =====
  
 +[[https://csrc.nist.gov/pubs/sp/800/81/r3/ipd|NIST SP 800 81r3 page]] with [[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.ipd.pdf|PDF]].
 +
 +===== Best Practice Configuration =====
 +The Infoblox STIG documents published by the US Defense Information Systems Agency. There is a DISA STIG for NIOS 8.x - https://www.stigviewer.com/stigs/infoblox_8x_dns
 +===== RPZ =====
 +When you use RPZ to download Threat Feeds from a provider (e.g. Infoblox, etc), make sure that at the first RPZ feed in the list is a local feed that lists your critical internal domains and RFC1918 (and other networks that you use), set the action to allow without logging. This will prevent your internal systems from being impacted by erroneous data in the providers feed.
 +===== NIOS Logging =====
 +Under Grid Properties > General > Basic > Audit Logging you can set "Brief", "Detailed", "WAPI Detailed". Setting to Brief instead of Detailed can (and has) hampered Infoblox support in establishing exact root cause of issues.
 +
 +Under Grid Properties > Monitoring > Basic make sure you tick Copy Audit Log Message to Syslog. Because it is syslog that can be copied of to SIEM server, this is how you ensure a longer copy of audit logs.
 +===== DDI =====
 +  * DNS - If the Round Trip Time (RTT) between client and DNS server is greater than 200ms, then the user starts to notice.
 +  * DHCP - normally very tolerant of latency between client and DHCP server.
 +  * NTP - normally very tolerant of latency between client and NTP server.
 +
 +===== Return Minimal Responses =====
 +The option "Return Minimal Responses" should generally be disabled for external facing DNS servers.
 +
 +It has been see that enabling "Return Minimal Responses" can cause issues when Microsoft clients query NIOS which has a forwarder to a Microsoft Active Directory domain controller.
 +
 +
 +This means it returns
 +<code>;; ANSWER SECTION:
 +_mssms_mp_swa._tcp.domain.internal.local. 14400 IN SRV 0 0 80 domaincontrollerhostname.domain.internal.local.</code>
 +
 +
 +Instead of 
 +<code>;; ANSWER SECTION:
 +_mssms_mp_swa._tcp.domain.internal.local. 14400 IN SRV 0 0 80 domaincontrollerhostname.domain.internal.local.
 +
 +;; ADDITIONAL SECTION:
 +domaincontrollerhostname.domain.internal.local. 1200 IN      A       1.2.3.4
 +domaincontrollerhostname.domain.internal.local. 1200 IN      AAAA    2002:2002:2002::2002:2002</code>
 +
 +That extra bit is needed by the Microsoft clients so "Return Minimal Responses" had to be disabled.
  
 ===== NIOS ===== ===== NIOS =====
Line 15: Line 52:
   * There might be a significant performance impact on your appliance and network during the DNS forwarding proxy installation process depending on the network connectivity between NIOS and BloxOne Threat Defense. Every node will have to install the DNS forwarding proxy before serving DNS recursive queries, which includes the HA nodes. [[https://docs.infoblox.com/space/nios85/35881759/Using+Forwarders|source]]   * There might be a significant performance impact on your appliance and network during the DNS forwarding proxy installation process depending on the network connectivity between NIOS and BloxOne Threat Defense. Every node will have to install the DNS forwarding proxy before serving DNS recursive queries, which includes the HA nodes. [[https://docs.infoblox.com/space/nios85/35881759/Using+Forwarders|source]]
   * If DHCP scavenging is not enabled, it should be, and it definitely can reduce the lease count.  If scavenging is not enabled, leases remain in the database even after they have expired.   * If DHCP scavenging is not enabled, it should be, and it definitely can reduce the lease count.  If scavenging is not enabled, leases remain in the database even after they have expired.
 +  * Enable single client lease feature of DHCP.
   * Enable the NIOS Object Change Tracking feature to reduce the quantity of data transferred. When you enable this feature, the appliance tracks the changes that are made to NIOS objects and periodically synchronizes changed objects.   * Enable the NIOS Object Change Tracking feature to reduce the quantity of data transferred. When you enable this feature, the appliance tracks the changes that are made to NIOS objects and periodically synchronizes changed objects.
   * Enable Object Change Tracking ([[https://docs.infoblox.com/space/nios90/280662600/Tracking+Object+Changes+in+the+Database|docs]]). Do this under Grid Properties.   * Enable Object Change Tracking ([[https://docs.infoblox.com/space/nios90/280662600/Tracking+Object+Changes+in+the+Database|docs]]). Do this under Grid Properties.
Line 33: Line 71:
  
 ===== DNS ===== ===== DNS =====
 +==== Recursive Queries ====
 +In the Security tab in the Grid DNS Properties, it is recommended to turn on the following two options:
 +  * Limit recursive queries per server
 +  * Limit recursive queries per zone
 +====Other ====
 In accordance with [[https://datatracker.ietf.org/doc/html/rfc6303|RFC 6303]] consider adding the following PTR zones as standard. In accordance with [[https://datatracker.ietf.org/doc/html/rfc6303|RFC 6303]] consider adding the following PTR zones as standard.
  
infoblox/best_practice.1712163677.txt.gz · Last modified: by bstafford