infoblox_threat_defense:dfp
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_threat_defense:dfp [2025/06/26 15:20] – [NIOS] bstafford | infoblox_threat_defense:dfp [2025/11/12 15:28] (current) – [Add/Copy Source IP] bstafford | ||
|---|---|---|---|
| Line 7: | Line 7: | ||
| DFP will maintain a management channel network session to BloxOne cloud. It will also maintain a separate DNS resolution channel (DNS-over-TLS on TCP-443). The management channel may be closed when not needed. DFP will try to keep the DNS resolution channel open but this isn't guaranteed. | DFP will maintain a management channel network session to BloxOne cloud. It will also maintain a separate DNS resolution channel (DNS-over-TLS on TCP-443). The management channel may be closed when not needed. DFP will try to keep the DNS resolution channel open but this isn't guaranteed. | ||
| - | NOTE: If you connect NIOS to CSP and enable DFP, if you then "reset all license" | + | NOTE: If you connect NIOS to CSP and enable DFP, if you then "reset all license" |
| ===== Local On-Prem Resolution ===== | ===== Local On-Prem Resolution ===== | ||
| Line 24: | Line 24: | ||
| If both Add and Copy are both ticked, Copy trumps add (i.e. if there is anything to copy, ' | If both Add and Copy are both ticked, Copy trumps add (i.e. if there is anything to copy, ' | ||
| + | |||
| + | NOTE: Consider enabling ADD only for the DNS server that clients query directly. This prevents a malicious user from spoofing the source IP by adding their own EDNS0 data. By having ADD only, Infoblox will wipe the EDNS0 data and add the true source IP. If you set COPY at the client facing resolver, then spoofed entries can make their way up to Threat Defense Cloud. You can then set COPY at the recursive caching layer that sits (if it exists) between the DNS servers that clients query and the Threat Defense cloud. | ||
| ===== DHCP/IPAM ===== | ===== DHCP/IPAM ===== | ||
| Line 87: | Line 89: | ||
| < | < | ||
| forwarders { 127.0.0.1 port 1024; };</ | forwarders { 127.0.0.1 port 1024; };</ | ||
| + | or (depending on whether **Fallback to the default resolution process if Infoblox Threat Defense Cloud does not respond** is enabled in NIOS DFP UI Config. See below for more details) | ||
| + | |||
| + | < | ||
| + | forwarders { 127.0.0.1 port 1024; };</ | ||
| + | |||
| + | If, and only if, you have enabled '' | ||
| + | |||
| If the DFP on NIOS cannot access the four Threat Defense Anycast IP addresses, it will take about a minute to detect the failure. It will then remove the two lines of config (restoring original config if applicable; such as forwarding to 8.8.8.8) above from BIND and restart BIND to use local resolution configuration. During the BIND restart, DNS is also non-responsive. While BIND is being used locally for DNS, the DFP continues to monitor the Threat Defense Anycast IP addresses. When it determines that Threat Defense Anycast DNS is available once more, it will restart BIND to redirect queries to the cloud. The restart time on BIND will cause a DNS downtime for the network. This means that the failure> | If the DFP on NIOS cannot access the four Threat Defense Anycast IP addresses, it will take about a minute to detect the failure. It will then remove the two lines of config (restoring original config if applicable; such as forwarding to 8.8.8.8) above from BIND and restart BIND to use local resolution configuration. During the BIND restart, DNS is also non-responsive. While BIND is being used locally for DNS, the DFP continues to monitor the Threat Defense Anycast IP addresses. When it determines that Threat Defense Anycast DNS is available once more, it will restart BIND to redirect queries to the cloud. The restart time on BIND will cause a DNS downtime for the network. This means that the failure> | ||
| Line 96: | Line 105: | ||
| If the local NIOS is told to use forwarders but NOT "only forwards" | If the local NIOS is told to use forwarders but NOT "only forwards" | ||
| - | Note that blocking Anycast doesn' | + | Note that blocking |
| Note, in CSP you can configure Internal Domains on the DFP service. If configured, these will be applied to NIOS. This is in addition to any forward-forward zones configured in NIOS. The order is | Note, in CSP you can configure Internal Domains on the DFP service. If configured, these will be applied to NIOS. This is in addition to any forward-forward zones configured in NIOS. The order is | ||
| Line 106: | Line 115: | ||
| Note, in CSP you can configure " | Note, in CSP you can configure " | ||
| - | Note, if the CSP applies a security " | ||
| - | If NIOS is HA, make sure to add both members | + | |
| + | |||
| + | |||
| + | If you have the '' | ||
| + | |||
| + | When you enable '' | ||
| + | < | ||
| + | forward only; | ||
| + | forwarders { 127.0.0.1 port 1024; }; | ||
| + | ...</ | ||
| + | to forward first. | ||
| + | < | ||
| + | forward first; | ||
| + | forwarders { 127.0.0.1 port 1024; }; | ||
| + | ...</ | ||
| + | |||
| + | Note, if NIOS is using DFP (rather than " | ||
| + | |||
| + | Assuming DFP is healthy: | ||
| + | |||
| + | NIOS | ||
| + | * DNSEC Disabled (no trust anchors). Fallback Disabled. - IP answer and no log in Portal. 630 msec to resolve | ||
| + | DNSEC Enabled (no trust anchors). Fallback Disabled. - SERVFAIL and also SERVFAIL log in Portal. 532 msec to resolve. Response cached locally for about 5 seconds. | ||
| + | * DNSEC Enabled (no trust anchors). Fallback Enabled. - IP answer and no log in Portal. 630 msec to resolve | ||
| + | * DNSEC Disabled (no trust anchors). Fallback Enabled. - IP answer and no log in Portal. 630 msec to resolve | ||
| + | |||
| + | |||
| + | NIOS-X (DFP+DNS) | ||
| + | Disable Signature Validation on DNS = You get IP and no log | ||
| + | Enabled Signature Validation on DNS and NO Trust Root Anchor = You get SERVFAIL and log generated | ||
| + | |||
| + | |||
| + | If a NIOS member | ||
| When using DFP, NIOS uses the LAN1 port to establish DoT on TCP-443 to Infoblox Anycast. This is true EVEN IF THE NIOS is HA. NIOS will not use the HA VIP for TCP-443. However, any plaintext queries will come from the HA VIP. | When using DFP, NIOS uses the LAN1 port to establish DoT on TCP-443 to Infoblox Anycast. This is true EVEN IF THE NIOS is HA. NIOS will not use the HA VIP for TCP-443. However, any plaintext queries will come from the HA VIP. | ||
| Line 114: | Line 154: | ||
| During HA failover, queries dropped for about 15 seconds in my lab. | During HA failover, queries dropped for about 15 seconds in my lab. | ||
| - | Internal Domains configured in CSP are only honoured if " | + | Internal Domains configured in CSP are only honoured if " |
| When you join a NIOS member to the CSP, it may take 5-10 minutes to register fully. | When you join a NIOS member to the CSP, it may take 5-10 minutes to register fully. | ||
| "Local On-Prem Resolution" | "Local On-Prem Resolution" | ||
| - | |||
| - | If you have the '' | ||
| ===== IPAM Security Policy ===== | ===== IPAM Security Policy ===== | ||
| - | when you run a file of dig queries against a NIOS DFP, if you stop and start again, you get responses from cache. If you have two DFP and run one against the first DFP and then run the same against the second DFP, the DNS auth server gets both messages. This indicates the cache is in local NIOS itself. | + | When you run a file of dig queries against a NIOS DFP, if you stop and start again, you get responses from cache. If you have two NIOS-X |
| + | |||
| + | If you have an IPAM based security policy in DFP (or local RPZ configured based on source IP), cache may will allow a client to bypass the security policy. If Client A is blocked from resolving example.com, | ||
| - | If you have an IPAM based security policy in DFP (or local RPZ for that matter), cache will allow a client to bypass the restriction. That is, if clientA is blocked from resolving example.com, | ||
| ===== NIOS DFP Logs ===== | ===== NIOS DFP Logs ===== | ||
| Line 153: | Line 192: | ||
| If you have LAN2 connected to Internet and you have LAN1 connected to internal network, and if LAN1 does not have internet access, you will need to add static routes to a NIOS appliance to get DFP working correctly. Specifically, | If you have LAN2 connected to Internet and you have LAN1 connected to internal network, and if LAN1 does not have internet access, you will need to add static routes to a NIOS appliance to get DFP working correctly. Specifically, | ||
| + | * 52.119.40.100/ | ||
| + | * 52.119.41.100/ | ||
| * 103.80.5.100/ | * 103.80.5.100/ | ||
| - | * 52.119.41.100/ | ||
| - | * 52.119.40.100/ | ||
| * 103.80.6.100/ | * 103.80.6.100/ | ||
| * 3.209.116.255/ | * 3.209.116.255/ | ||
| * 3.210.226.54/ | * 3.210.226.54/ | ||
| * 3.212.42.44/ | * 3.212.42.44/ | ||
| - | * 18.235.149.1/32 | + | * 3.214.29.106/32 |
| + | * 3.214.194.152/ | ||
| + | * 3.213.214.20/32 | ||
| * 18.209.243.220/ | * 18.209.243.220/ | ||
| * 18.233.189.178/ | * 18.233.189.178/ | ||
| - | * 3.213.214.20/32 | + | * 18.235.149.1/32 |
| - | * 3.214.194.152/ | + | |
| - | * 3.214.29.106/ | + | |
| - | + | ||
infoblox_threat_defense/dfp.1750951258.txt.gz · Last modified: by bstafford
