infoblox:best_practice
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox:best_practice [2024/04/03 17:01] – [NIOS] bstafford | infoblox:best_practice [2025/12/09 09:33] (current) – [DNS] bstafford | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== | + | ====== |
| + | If you are configuring a dual-stack network for the host, you must set the minimum MTU value for the IPv4 address to 1280; if you do not, the IPv6 address will not be functional. | ||
| + | ===== NIST Best Practice for DNS ===== | ||
| + | [[https:// | ||
| + | |||
| + | ===== Best Practice Configuration ===== | ||
| + | The Infoblox STIG documents published by the US Defense Information Systems Agency. There is a DISA STIG for NIOS 8.x - https:// | ||
| + | ===== RPZ ===== | ||
| + | When you use RPZ to download Threat Feeds from a provider (e.g. Infoblox, etc), make sure that at the first RPZ feed in the list is a local feed that lists your critical internal domains and RFC1918 (and other networks that you use), set the action to allow without logging. This will prevent your internal systems from being impacted by erroneous data in the providers feed. | ||
| + | ===== NIOS Logging ===== | ||
| + | Under Grid Properties > General > Basic > Audit Logging you can set " | ||
| + | |||
| + | Under Grid Properties > Monitoring > Basic make sure you tick Copy Audit Log Message to Syslog. Because it is syslog that can be copied of to SIEM server, this is how you ensure a longer copy of audit logs. | ||
| + | ===== DDI ===== | ||
| + | * DNS - If the Round Trip Time (RTT) between client and DNS server is greater than 200ms, then the user starts to notice. | ||
| + | * DHCP - normally very tolerant of latency between client and DHCP server. | ||
| + | * NTP - normally very tolerant of latency between client and NTP server. | ||
| + | |||
| + | ===== Return Minimal Responses ===== | ||
| + | The option " | ||
| + | |||
| + | It has been see that enabling " | ||
| + | |||
| + | |||
| + | This means it returns | ||
| + | < | ||
| + | _mssms_mp_swa._tcp.domain.internal.local. 14400 IN SRV 0 0 80 domaincontrollerhostname.domain.internal.local.</ | ||
| + | |||
| + | |||
| + | Instead of | ||
| + | < | ||
| + | _mssms_mp_swa._tcp.domain.internal.local. 14400 IN SRV 0 0 80 domaincontrollerhostname.domain.internal.local. | ||
| + | |||
| + | ;; ADDITIONAL SECTION: | ||
| + | domaincontrollerhostname.domain.internal.local. 1200 IN A | ||
| + | domaincontrollerhostname.domain.internal.local. 1200 IN AAAA 2002: | ||
| + | |||
| + | That extra bit is needed by the Microsoft clients so " | ||
| ===== NIOS ===== | ===== NIOS ===== | ||
| Line 34: | Line 71: | ||
| ===== DNS ===== | ===== DNS ===== | ||
| + | ==== Recursive Queries ==== | ||
| + | In the Security tab in the Grid DNS Properties, it is recommended to turn on the following two options: | ||
| + | * Limit recursive queries per server | ||
| + | * Limit recursive queries per zone | ||
| + | ====Other ==== | ||
| In accordance with [[https:// | In accordance with [[https:// | ||
infoblox/best_practice.1712163702.txt.gz · Last modified: by bstafford
