User Tools

Site Tools


infoblox:firewall_rules

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
infoblox:firewall_rules [2025/03/03 16:29] bstaffordinfoblox:firewall_rules [2026/03/12 11:36] (current) – [To DHCP Partner] bstafford
Line 1: Line 1:
 ====== Infoblox Firewall Rules ====== ====== Infoblox Firewall Rules ======
 +===== NIOS Firewall Rules ===== 
 +[[https://docs.infoblox.com/space/nios90/1327530037/Source+and+Destination+Ports+for+Services|Here]].
 ===== Documentation Page ===== ===== Documentation Page =====
 To access the [[https://docs.infoblox.com/|Documentation Page]] you must allow the following domains To access the [[https://docs.infoblox.com/|Documentation Page]] you must allow the following domains
Line 7: Line 8:
   * static-us.dg.refined.site    * static-us.dg.refined.site 
  
 +===== BloxConnect =====
 +  * DST FQDN - grpc.csp.infoblox.com
 +  * DST Port - 443
 +  * SRC Port - 26749
 +  * Protocol - TCP
 +  * Only runs if BloxConnect is enabled.
 +  * Once an appliance is elected to send data, it will not try to elect other members until and unless data sending is failed with previous elected node
 +  * If the appliance that was sending data to BloxConnect fails to send data (can't connect) then all members of a Grid will test connectivity once every 24 hours
 +  * When BloxConnect is disabled, data is synced to all members every 8 hours.
 +
 +Election Logic
 +  - CSP Connected GM (active node) (i.e. with Join token)
 +  - CSP Connected GMC (i.e. with Join token)
 +  - CSP Connected Member (i.e. with Join token)
 +  - GM with connectivity to CSP
 +  - GMC with connectivity to CSP
 +  - Member with connectivity to CSP
 +
 +
 +===== Rules for Data Connector =====
 +When you have the Infoblox Cloud Data Connector (in cloud) "as a service" sending directly cloud-to-cloud to Sentinel/Splunk/etc using HTTPS, then the traffic will come from the following IP that [[https://docs.infoblox.com/space/BloxOneCloud/774931918/Data+Connector+HTTP+Destination+for+MS+Sentinel+and+Splunk+(Data+Connector+to+On-prem+or+Cloud)|you may need to put in an allowlist in Sentinel/Splunk]].
 +  * 3.221.42.234 (prd1.threatdefense.infoblox.com)
 +
 +===== Asset Insights =====
 +When configuring public cloud to allow access from Infoblox Portal to your public Cloud API for discovery, you may need to add the following IP to an allow list.
 +  * 3.221.42.234 (prd1.threatdefense.infoblox.com)
 ===== Rules for Endpoint ==== ===== Rules for Endpoint ====
 Documented [[https://docs.infoblox.com/space/BloxOneThreatDefense/35374317/Downloading+Endpoint|here]] and [[https://docs.infoblox.com/space/BloxOneThreatDefense/331874469/Best+Practices+for+Endpoint|here (best practice)]]. Documented [[https://docs.infoblox.com/space/BloxOneThreatDefense/35374317/Downloading+Endpoint|here]] and [[https://docs.infoblox.com/space/BloxOneThreatDefense/331874469/Best+Practices+for+Endpoint|here (best practice)]].
Line 46: Line 73:
 | Johannesburg (South Africa) | 52.119.41.62 | 103.80.6.62 | af-south-1-geo.threatdefense.infoblox.com | | Johannesburg (South Africa) | 52.119.41.62 | 103.80.6.62 | af-south-1-geo.threatdefense.infoblox.com |
 | Ohio (USA) | 52.119.41.63 | 103.80.6.63 | us-east-2-geo.threatdefense.infoblox.com |  | Ohio (USA) | 52.119.41.63 | 103.80.6.63 | us-east-2-geo.threatdefense.infoblox.com | 
 +| Hyderabad (India) | 52.119.41.64 | 103.80.6.64 | ap-south-2-geo.threatdefense.infoblox.com | 
 +| Hong Kong | 52.119.41.65 | 103.80.6.65 | ap-east-1-geo.threatdefense.infoblox.com | 
  
-^ Region ^ Exit IPv4 Address ^ Exit IPv4 Address ^ Hostname 1 ^ Hostname 2 ^  
-| California (USA) | 50.18.3.254 | 52.52.152.211 | ca1.threatdefense.infoblox.com | ca2.threatdefense.infoblox.com |  
-| Virginia (USA) | 3.221.42.234 | 3.210.133.138 | prd1.threatdefense.infoblox.com | prd2.threatdefense.infoblox.com  
-| London (England) | 3.9.234.55  3.11.119.74 | 13.42.84.27 | ld1.threatdefense.infoblox.com | ld2.threatdefense.infoblox.com |  
-| Frankfurt (Germany) | 18.158.253.104 | 18.156.59.212 | fk1.threatdefense.infoblox.com | fk2.threatdefense.infoblox.com |  
-| Mumbai (India) | 65.0.152.93 | 3.7.67.223 | mb1.threatdefense.infoblox.com | | 
-| Tokyo (Japan) | 13.230.205.59 | n/a | jp1.threatdefense.infoblox.com |  | 
-| Singapore | 54.179.114.1 | n/a  | sg1.threatdefense.infoblox.com |  | 
-| Toronto (Canada) | 3.96.72.179 | n/a  | to1.threatdefense.infoblox.com |  | 
-| Sydney (Australia) | 3.104.250.224 |n/a  | sy1.threatdefense.infoblox.com | |  
-| San Paulo (Brazil) | 54.94.69.164 | n/a | sp1.threatdefense.infoblox.com |  | 
-| Bahrain (UAE) | 15.184.140.118 | n/a | br1.threatdefense.infoblox.com |  | 
-| Johannesburg (South Africa) | 13.245.50.242 | n/a | ec2-13-245-50-242.af-south-1.compute.amazonaws.com | | 
-| Ohio (USA) | 3.143.123.31 | n/a | ec2-3-143-123-31.us-east-2.compute.amazonaws.com | | 
- 
-You can get this list above by retrieving all records for ''threatdefense.bloxone.infoblox.com''. 
 ==== Threat Defense Notes ==== ==== Threat Defense Notes ====
  
Line 114: Line 127:
   * ntp3.wirehive.net   * ntp3.wirehive.net
   * motd.ubuntu.com   * motd.ubuntu.com
 +
 +FYI:
 +  * Platform Management - Handles communication between NIOS-X and Infoblox Portal. Runs underlying OS and Kubernetes - that is all. Not aware of applications.
 +  * Application Management - Handles various services running on NIOS-X itself. This is the system that reaches out to Infoblox Portal to download updated application images.
  
  
 ==== To DHCP Partner ==== ==== To DHCP Partner ====
-Active member of a Advanced Active/Passive HA pair talks to the passive member on tcp-847. Application is grpc and it uses HTTP/2.+Active member of a Advanced Active/Passive HA pair talks to the passive member on tcp-847. Two traffic flows (GRPC and HTTP) run to this port. 
 + 
 +Both members of an DHCP HA pair talk to each other on udp-647 (heartbeat).
  
-Both members of an DHCP HA pair talk to each other on udp-647. 
  
 +tcp-647 for Kea HA (also used in hub-spoke Kea HA)
 ==== Changing NIOX-X Server IP ==== ==== Changing NIOX-X Server IP ====
 When the IP address of a NIOS-X virtual server is changed, for a while after the change the internal docker image will try to access certain ports of the device using the old IP. Therefore you may see, in your network traffic logs, traffic from the new IP to the old IP on the following ports. When the IP address of a NIOS-X virtual server is changed, for a while after the change the internal docker image will try to access certain ports of the device using the old IP. Therefore you may see, in your network traffic logs, traffic from the new IP to the old IP on the following ports.
infoblox/firewall_rules.1741019371.txt.gz · Last modified: by bstafford