infoblox_threat_defense:rpz_feeds
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_threat_defense:rpz_feeds [2025/08/24 22:30] – bstafford | infoblox_threat_defense:rpz_feeds [2026/03/08 18:43] (current) – [NSDNAME and NSIP] bstafford | ||
|---|---|---|---|
| Line 8: | Line 8: | ||
| Some OpenSource feeds [[https:// | Some OpenSource feeds [[https:// | ||
| + | |||
| + | [[https:// | ||
| ===== Best Practice ===== | ===== Best Practice ===== | ||
| Line 13: | Line 15: | ||
| [[https:// | [[https:// | ||
| + | |||
| + | REMEMBER: ALL RPZ get evaluated BEFORE query is made. IP rules are ignored. IP Rules get evaluated when response is received. | ||
| Infoblox Threat Defense will never block *.infoblox.com even if it is explicitly blocked by Security Policy. This is because the domain is trusted and run by Infoblox and is necessary for basic functioning of the service. | Infoblox Threat Defense will never block *.infoblox.com even if it is explicitly blocked by Security Policy. This is because the domain is trusted and run by Infoblox and is necessary for basic functioning of the service. | ||
| Line 43: | Line 47: | ||
| ===== RPZ Sizing ===== | ===== RPZ Sizing ===== | ||
| As of NIOS 9.0.1 in Dec 2023: ([[https:// | As of NIOS 9.0.1 in Dec 2023: ([[https:// | ||
| - | ^ Model ^ RPZ Rule Count ^ Notes ^ | + | As of NIOS 9.0.7 in Oct 2025 - new column added. Note, running Threat Feeds AND Threat Insight is not supported on TE-1415 and TE-1425. |
| - | | TE-815 | 1.5 million RPZ entries | + | ^ Model ^ RPZ Entry Count (NIOS >= 9.0.7) |
| - | | TE-825 | 2 million RPZ entries | + | | TE-815 |
| - | | **TE-926**/TE-1415 | 6 million RPZ entries | + | | TE-825 | 6M (TI not supported) | 2M | Base + Base IP only | |
| - | | TE-1425 | 8 million RPZ entries | + | | TE-1415 | 12M (TI not supported) | 6M | Base + Base IP only + Informational |
| - | | **TE-1516**/**TE-1526** | 20 million RPZ entries | + | | TE-1425 | 12M (TI not supported) | 8M | Base + Base IP only + Informational |
| - | | TE-2215/TE-2225 | 25 million RPZ entries | + | | TE-2215/TE-2225 (20M with TI) | 40M | 25M | Everything | |
| - | | **TE-2326**/ | + | | TE-4015/ |
| + | | **TE-926** | 16M (TI not supported) | 6M | Base + Base IP only | | ||
| + | | **TE-1516**/**TE-1526** (15M with TI) | 40M | 20M | Everything | ||
| + | | **TE-2326**/ | ||
| ===== Suggested Best Practice for Cloud Based Security Policies ===== | ===== Suggested Best Practice for Cloud Based Security Policies ===== | ||
| Line 186: | Line 193: | ||
| Another nice thing about custom RPZ feeds is that you can pull the data easily to other tool. e.g. dig with correct commands to do a zone transfer. Put that through a small shell script to filter the data into host file format and you can put it on a PiHole. | Another nice thing about custom RPZ feeds is that you can pull the data easily to other tool. e.g. dig with correct commands to do a zone transfer. Put that through a small shell script to filter the data into host file format and you can put it on a PiHole. | ||
| + | |||
| + | ===== IP in Custom List ===== | ||
| + | You can block (or allow) traffic based on answer IP by using Custom list. This can be done for a single IP by adding x.x.x.x/32. If you don't add /32, it will be added automatically when you save the Custom list. You can also add subnets such as y.y.y.y/24. | ||
| + | |||
| ===== RPZ Source ===== | ===== RPZ Source ===== | ||
| Line 317: | Line 328: | ||
| * **Block** - Contains entries that should be blocked with confidence given the level of protection needed (e.g. low protection for public wifi and extreme protection for the military) | * **Block** - Contains entries that should be blocked with confidence given the level of protection needed (e.g. low protection for public wifi and extreme protection for the military) | ||
| * **Log** - Goes along with the aligned **Block** list but contains entries that don't have as high a confidence level. | * **Log** - Goes along with the aligned **Block** list but contains entries that don't have as high a confidence level. | ||
| + | |||
| + | ===== NSDNAME and NSIP ===== | ||
| + | |||
| + | Disable NSDNAME/ | ||
| + | |||
| + | RPZ NSDNAME (Name Server Domain Name) | ||
| + | * Definition: This trigger matches the domain name of the authoritative name server (found in the NS records) during recursive resolution. | ||
| + | * Use Case: If a malicious actor uses ns1.badactor.com to host 5,000 phishing websites, you can create an RPZ rule targeting ns1.badactor.com.rpz-nsdname. Any domain utilizing that name server will be blocked. | ||
| + | * Key Advantage: It catches new malicious domains immediately, | ||
| + | |||
| + | RPZ NSIP (Name Server IP Address) | ||
| + | * Definition: This trigger matches the actual IP address (IPv4 or IPv6) in the A/AAAA records of name servers associated with domains (glue records). | ||
| + | * Use Case: If a malicious server changes its name (e.g., from ns1.badactor.com to ns1.sneaky.com) but keeps the same IP address (e.g., 192.0.2.55), | ||
| + | * Functionality: | ||
| + | | ||
| + | | ||
| ===== RPZ BAU Syslog on NIOS ===== | ===== RPZ BAU Syslog on NIOS ===== | ||
| In NIOS, you get the following syslog on the member doing the RPZ feed | In NIOS, you get the following syslog on the member doing the RPZ feed | ||
| Line 443: | Line 470: | ||
| * Major = 7 | * Major = 7 | ||
| * Critical = 8 | * Critical = 8 | ||
| + | |||
| + | Official SYSLOG Severity levels | ||
| + | * 0 (Emergency): | ||
| + | * 1 (Alert): Action must be taken immediately (e.g., primary ISP loss). | ||
| + | * 2 (Critical): Critical conditions (e.g., failing hardware, primary application failure). | ||
| + | * 3 (Error): Error conditions, non-urgent failures. | ||
| + | * 4 (Warning): Potential errors if no action is taken (e.g., low disk space). | ||
| + | * 5 (Notice): Unusual but not error conditions, ongoing events. | ||
| + | * 6 (Informational): | ||
| + | * 7 (Debug): Detailed information for developers | ||
| A note on Mitigation Action | A note on Mitigation Action | ||
| Line 464: | Line 501: | ||
| * rpz: ransomware.rpz.infoblox.local: | * rpz: ransomware.rpz.infoblox.local: | ||
| * zone ransomware.rpz.infoblox.local/ | * zone ransomware.rpz.infoblox.local/ | ||
| + | |||
| + | ==== RPZ Transferring Data ==== | ||
| + | When a new copy of the RPZ is downloaded (transferred) | ||
| + | * rpz: bogon.rpz.infoblox.local: | ||
| + | * (re)loaded policy zone ' | ||
| + | * rpz: bogon.rpz.infoblox.local: | ||
| + | |||
| + | You can force a new download with | ||
| + | < | ||
| + | < | ||
infoblox_threat_defense/rpz_feeds.1756074622.txt.gz · Last modified: by bstafford
