infoblox_threat_defense:geolocation
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_threat_defense:geolocation [2025/02/16 19:49] – [Testing] bstafford | infoblox_threat_defense:geolocation [2026/02/25 09:47] (current) – bstafford | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| * For Infoblox, this list is mostly services Google, YouTube, SalesForce, Netskope, etc. | * For Infoblox, this list is mostly services Google, YouTube, SalesForce, Netskope, etc. | ||
| - | * Microosft | + | * Microsoft |
| * Infoblox forwards the /24 when forwarding ECS data. | * Infoblox forwards the /24 when forwarding ECS data. | ||
| * When using an Infoblox Endpoint, the public IP is the one that Infoblox Cloud sees as the source IP. i.e. the public IP that the Infoblox Endpoint is source NAT'd behind. | * When using an Infoblox Endpoint, the public IP is the one that Infoblox Cloud sees as the source IP. i.e. the public IP that the Infoblox Endpoint is source NAT'd behind. | ||
| * When using an External Network, the public IP is the External Network being used. | * When using an External Network, the public IP is the External Network being used. | ||
| * When using NIOS-XaaS with DFP, it is the public IP of the NIOS-XaaS POP being used. | * When using NIOS-XaaS with DFP, it is the public IP of the NIOS-XaaS POP being used. | ||
| - | * When using a DFP, the public IP used is the public IP that Infoblox has associated with that DFP. i.e. the public IP that the DFP is source NAT'd behind. | + | * When using a DFP, the public IP used is the public IP that Infoblox has associated with that DFP (called "NAT IP Address" |
| You can check what IP the service sees by testing against Google. | You can check what IP the service sees by testing against Google. | ||
| - | < | + | < |
| Line 29: | Line 29: | ||
| There is a performance impact on the cache layer due to the overload of the domains in the ECS list. End users shouldn’t really care/know about that. | There is a performance impact on the cache layer due to the overload of the domains in the ECS list. End users shouldn’t really care/know about that. | ||
| + | |||
| + | ===== NIOS-XaaS ===== | ||
| + | When using NIOS-XaaS, if you have DNS and DFP and enable Geolocation, | ||
| + | |||
| + | This is because when you query the XaaS DNS server, it then forwards to the Threat Defense POP. | ||
| ===== Testing ===== | ===== Testing ===== | ||
| Line 52: | Line 57: | ||
| " | " | ||
| In the example above, | In the example above, | ||
| + | |||
| + | However, if you disable geo-location but then add subnet data to your query (e.g. +subnet=10.10.10.0/ | ||
| + | |||
| + | If geolocation is enabled and you use +subnet, then you value is copied and Threat Defense will not add your actual public IP. | ||
infoblox_threat_defense/geolocation.1739735367.txt.gz · Last modified: by bstafford
