infoblox_nios:firewall_rules
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_nios:firewall_rules [2023/03/08 07:29] – bstafford | infoblox_nios:firewall_rules [2024/04/21 02:09] (current) – [Reporting Server] bstafford | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== NIOS Firewall Rules ===== | + | ===== NIOS Firewall Rules ==== |
| + | ==== Threat Insight | ||
| When running Threat Insight and/or ADP on the Grid, to download the latest module updates and whitelist updates or ADP updates , the Grid Master needs to resolve and access '' | When running Threat Insight and/or ADP on the Grid, to download the latest module updates and whitelist updates or ADP updates , the Grid Master needs to resolve and access '' | ||
| - | For Threat Insight, only the Grid Master receives module and whitelist set updates. Grid member receives these updates through standard Grid replication from the Grid Master. Module and whitelist data is only replicated to Grid members that have the threat analytics service enabled (an RPZ license is required to start this service | + | ==== Ports ==== |
| + | NIOS listens | ||
| + | ==== Public IP List ==== | ||
| + | Full list [[https:// | ||
| - | Note: The scheduled time does not indicate | + | ==== Rules ==== |
| + | * **Grid Connection** From all members to GM/GMC and vice-versa. UDP 2114 & UDP 1194. | ||
| + | * **Reporting** All members of the Grid need to be able to talk to port TCP 9997 on the reporting server. | ||
| + | * **NTP** GM/GMC should access NTP servers on UDP 123. Other members sync to the active GM. If you want members to configure directly to external NTP source, configure accordingly. | ||
| + | * **DNS** All members should have access to DNS recursion unless | ||
| + | * **Access** System admins should access GM/GMC on TCP 443 (HTTPS). | ||
| + | * **Access** System admins should access all members on TCP 22 (SSH). | ||
| + | * **Syslog** should have access to UDP 514 to the syslog server. | ||
| + | * **Email** GM/GMC should have access to TCP 25 to the email server. | ||
| + | * **Monitoring** All members should have access to UDP 162 on SNMP monitoring server. | ||
| + | * **Monitoring** SNMP monitoring server should have access to all members on UDP 161. | ||
| - | + | ==== NIOS DFP to CSP ==== | |
| - | You can only update | + | ^ Destination address ^ Destination Host Name ^ Destination Port ^ |
| - | + | | 52.119.40.100 | threatdefense.bloxone.infoblox.com | 53 | | |
| - | + | | 52.119.40.100 | threatdefense.bloxone.infoblox.com | 443 | | |
| - | You can block the highest domain level only if you have installed the Threat Analytics license on the Grid member. | + | | 103.80.5.100 | threatdefense.bloxone.infoblox.com | 443 | |
| - | + | | 52.119.41.100 | threatdefense.infoblox.com | 443 | | |
| - | To use Configure Domain Level to block Tunneling option, ensure you update the moduleset to the latest version after a NIOS upgrade. The minimum version of the active moduleset must be equal or later than 20190410. | + | | 103.80.6.100 | threatdefense.infoblox.com | 443 | |
| + | | 3.209.116.255 | ec2-3-209-116-255.compute-1.amazonaws.com | 443 | | ||
| + | | 3.210.226.54 | ec2-3-210-226-54.compute-1.amazonaws.com | 443 | | ||
| + | | 3.212.42.44 | | ||
| + | | 3.214.29.106 | ec2-3-214-29-106.compute-1.amazonaws.com | 443 | | ||
| + | | 3.213.214.20 | ec2-3-213-214-20.compute-1.amazonaws.com | 443 | | ||
| + | | 18.233.189.178 | ec2-18-233-189-178.compute-1.amazonaws.com | 443 | | ||
| + | | 18.209.243.220 | ec2-18-209-243-220.compute-1.amazonaws.com | 443 | | ||
infoblox_nios/firewall_rules.1678260576.txt.gz · Last modified: by bstafford
