infoblox_threat_defense:dfp
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_threat_defense:dfp [2025/11/09 15:46] – bstafford | infoblox_threat_defense:dfp [2025/11/12 15:28] (current) – [Add/Copy Source IP] bstafford | ||
|---|---|---|---|
| Line 24: | Line 24: | ||
| If both Add and Copy are both ticked, Copy trumps add (i.e. if there is anything to copy, ' | If both Add and Copy are both ticked, Copy trumps add (i.e. if there is anything to copy, ' | ||
| + | |||
| + | NOTE: Consider enabling ADD only for the DNS server that clients query directly. This prevents a malicious user from spoofing the source IP by adding their own EDNS0 data. By having ADD only, Infoblox will wipe the EDNS0 data and add the true source IP. If you set COPY at the client facing resolver, then spoofed entries can make their way up to Threat Defense Cloud. You can then set COPY at the recursive caching layer that sits (if it exists) between the DNS servers that clients query and the Threat Defense cloud. | ||
| ===== DHCP/IPAM ===== | ===== DHCP/IPAM ===== | ||
| Line 133: | Line 135: | ||
| Assuming DFP is healthy: | Assuming DFP is healthy: | ||
| + | |||
| + | NIOS | ||
| * DNSEC Disabled (no trust anchors). Fallback Disabled. - IP answer and no log in Portal. 630 msec to resolve | * DNSEC Disabled (no trust anchors). Fallback Disabled. - IP answer and no log in Portal. 630 msec to resolve | ||
| DNSEC Enabled (no trust anchors). Fallback Disabled. - SERVFAIL and also SERVFAIL log in Portal. 532 msec to resolve. Response cached locally for about 5 seconds. | DNSEC Enabled (no trust anchors). Fallback Disabled. - SERVFAIL and also SERVFAIL log in Portal. 532 msec to resolve. Response cached locally for about 5 seconds. | ||
| * DNSEC Enabled (no trust anchors). Fallback Enabled. - IP answer and no log in Portal. 630 msec to resolve | * DNSEC Enabled (no trust anchors). Fallback Enabled. - IP answer and no log in Portal. 630 msec to resolve | ||
| * DNSEC Disabled (no trust anchors). Fallback Enabled. - IP answer and no log in Portal. 630 msec to resolve | * DNSEC Disabled (no trust anchors). Fallback Enabled. - IP answer and no log in Portal. 630 msec to resolve | ||
| + | |||
| + | |||
| + | NIOS-X (DFP+DNS) | ||
| + | Disable Signature Validation on DNS = You get IP and no log | ||
| + | Enabled Signature Validation on DNS and NO Trust Root Anchor = You get SERVFAIL and log generated | ||
infoblox_threat_defense/dfp.1762703163.txt.gz · Last modified: by bstafford
