User Tools

Site Tools


infoblox:ecosystem

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
infoblox:ecosystem [2020/11/13 09:38] – created bstaffordinfoblox:ecosystem [2025/12/30 11:53] (current) bstafford
Line 1: Line 1:
 ====== Infoblox Ecosystem ====== ====== Infoblox Ecosystem ======
-The Infoblxo Ecosystem licence is a single, Grid wide licence that gets applied to the Grid Master. It enables the Infoblox appliances to initiate API calls to third party vendor appliances (e.g. Palo Alto Networks firewalls). +===== Guardrails ===== 
- +Ecosystem for TD 4k events per user per day.
-===== Initial Setup with Palo Alto Networks ===== +
-Set the extensible attributes +
- +
-Grid Manager > Administration > Network Views > default > edit +
- +
-Add Extensible Attributes default values +
-  * PaloAlto_Asset_Sync true +
-  * PaloAlto_Asset_Tag allow +
-  * PaloAlto_Security_Sync true +
-  * PaloAlto_Security_Tag deny +
-  * PaloAlto_Timeout 30 +
- +
-PaloAlto_Asset_SyncedAt and PaloAlto_Security_SyncedAt have no default value +
- +
-PaloAlto_Asset_Sync and PaloAlto_Security_Sync should have the following list of options +
-  * true +
-  * false +
- +
- +
-To create the Extensible Attributes +
-Grid Manager > Administration > Extenisble Attributes +
- +
-(No default values) +
- +
-^ Name ^ TYPE ^ REQUIRED ^ INHERITANCE ^ COMMENT ^ +
-|PaloAlto_Asset_Sync | List | No | Yes | Whether or not syncing asset events with PAN is desired.| +
-|PaloAlto_Asset_SyncedAt | String | No | No | Timestamp for when the asset is synced with PAN.| +
-|PaloAlto_Asset_Tag | String | No | Yes | Tag that attaches to an IP to polulate it in a Dynamic Address Group (allow).| +
-|PaloAlto_Security_Sync | List | No | Yes | Whether or not syncing security events with PAN is desired.| +
-|PaloAlto_Security_SyncedAt | String | No |   | No | Timestatmp for when the security event is synced with PAN.| +
-|PaloAlto_Security_Tag | String | No | Yes | Tag that attaches to an IP to populate it in a Dynamic Address Group (deny).| +
-|PaloAlto_Timeout | Integer | No | Yes | Starting | +
-with PAN-OS 9.0 a tag can contain an optional timeout attribute. The default is 0 (never expires) or a timeout value in seconds for the tag. The maximum timeout is 2592000 (30 days). +
- +
- +
-===== Palo Alto Networks ===== +
- +
- +
-Remember, you need to create the address groups and tags on teh firewall before configuring infoblox. +
-Also, it is best practice to create a dummy address in each address group as each address group must have at least one object to be valid. +
-The main difference between this code and Infoblox template code is that this code doesn't put objects into "shared". it assumes no multi-vsys and will put things into  +
-/config/devices/entry[@name='localhost.localdomain']/vsys/entry[@name='vsys1']/ instead of /config/shared/ +
- +
- +
-There are two types of templates - session managment and event. +
-Session managment may use event types for some actions (e.g. device login and logout). +
-Session managment templates are assigned to "Outbound Endpoint" configs. This is also where you define variables that can be used in Event types. +
-Event types are assigned to "Notification" configs. +
- +
-The reason all the Infoblox guides say that you have to enable Multi VSYS is that they inject into "shared" which only exists on Multi VSYS system. +
- +
-vendor_identifier (e.g.   "vendor_identifier":"Palo Alto",) has to match a predifined list from Infobox +
- +
-JSON PATH is at the bottom of the event file.  +
- +
-192.168.99.0/27 +
- +
-Variables in templates (e.g. ${S::infoblox-created-objects}) are deffined in PAN_Session.txt +
- +
-When you edit PAN_Session.txt, you need to reimport it into Infoblox Grid and then check it under +
-Grid > Ecosystem > Outbound Endpoint > (firewall endpoint) > Session Management. +
- +
-Then re-import the template that you are editing with the new variable name. +
- +
-To update the firewall with new host records (IP) when new hosts are added, create the following +
- +
-PAN_Host_IPv4 +
-<code>Event = Object Change Host Address IPv4 +
-Match the following rule +
-IPv4 Address matches CIDR 192.168.99.0/27 (This does not have to match a specific subnet, 192.168.0.0/16 would match all subnets within 192.168.0.0/16) +
-Template = Palo Alto Static Assets</code> +
- +
-By default, this will create an Address object named after the IP (e.g. IP = 192.168.1.1 Name = 192.168.1.1). No tags. It will be added to the Address Group Iblox_Host_Allow) +
- +
-===== FROM DEMO ====== +
-This is from the Cloud based partner Demo system that Infoblox offers. +
- +
-The following are the rules for triggers. +
- +
-PAN_Lease: +
-<code>Template Palo Alto Dynamic Assets +
-Event = DHCP Leases +
-Match = ANY +
-Rules: +
-Network View equals default +
-Lease State equals Active +
-Lease State equals Expired +
-Lease State equals Free +
-Lease State equals Released +
-IP Address matches CIDR 172.0.0.0/24</code> +
- +
- +
-PAN_RPZ: +
-<code>Template = Palo Alto Dynamic Security +
-Event = DNS RPZ +
-Match = ANY +
-Rules: +
-Action Policy equals Local Data +
-Action Policy equals NXDOMAIN +
-Action Policy equals No Data +
-Action Policy equals Passthru +
-Rule Name contains . +
-Source IP matches CIDR 127.0.1.0/24</code> +
- +
- +
- +
-PAN_Tunnel: +
-<code>Template = Palo Alto Dynamic Security +
-Event = DNS Tunneling +
-Match = ANY +
-Source IP matches CIDR 172.0.0.0/+
-Source IP matches CIDR 10.0.0.0/24 +
-Source IP matches CIDR fc01::/64</code> +
- +
-PAN_ADP: +
-<code>Template = Palo Alto Dynamic Security +
-Event = Security ADP +
-Match = ANY +
-Hits Count is creter than 5 +
-Rule Action equals Alert +
-Rule Action equals Drop +
-Rule Action equals Pass +
-Rule Severity equals Critical +
-Rule Severity equals Major +
-Rule Severity equals Warning +
-Rule Severity equals Informational</code> +
- +
- +
-PAN_Fixed_IPv6 +
-<code>Template = Palo Alto Dynmaic Assets +
-Event = Object Change Fixed Address Ipv6 +
-Match the following rule: +
-Network View contains default</code> +
- +
- +
-PAN_Host_IPv6 +
-<code>Template = Palo Alto Dynmaic Assets +
-Event = Object Change Host Address Ipv6 +
-Match the following rule: +
-Network View contains default</code> +
- +
- +
- +
- +
-PAN_Fixed_IPv4_Static +
-<code>Template = Palo Alto Static Assets +
-Event = Object Change Fixed Address IPv4 +
-Match the following rule: +
-IPv4 Address matches CIDR 172.0.0.0/24</code> +
- +
-PAN_Fixed_IPv4_Dynamic +
-<code>Template = Palo Alto Dynmaic Assets +
-Event = Object Change Fixed Address IPv4 +
-Match the following rule: +
-IPv4 Address matches CIDR 10.0.0.0/24</code> +
- +
-PAN_Host_IPv4_Static +
-<code>Template = Palo Alto Static Assets +
-Event = Object Change Host Address IPv4 +
-Match the following rule: +
-IPv4 Address match CIDR 172.0.0.0/24</code> +
- +
- +
- +
-PAN_Host_IPv4_Dynamic +
-<code>Template = Palo Alto Dynamic Assets +
-Event = Object Change Host Address IPv4 +
-Match the following rule: +
-IPv4 Address match CIDR 10.0.0.0/24</code> +
- +
- +
-PAN_Records +
-<code>Template = Palo Alto Static Records +
-Event = Object Change DNS Records +
-Match = ANY +
-Rules: +
-Networks View contains default +
-Zone Name contains .</code>+
  
infoblox/ecosystem.1605260305.txt.gz · Last modified: (external edit)