infoblox_threat_defense:rpz_feeds
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_threat_defense:rpz_feeds [2025/10/27 09:58] – bstafford | infoblox_threat_defense:rpz_feeds [2026/03/08 18:43] (current) – [NSDNAME and NSIP] bstafford | ||
|---|---|---|---|
| Line 15: | Line 15: | ||
| [[https:// | [[https:// | ||
| + | |||
| + | REMEMBER: ALL RPZ get evaluated BEFORE query is made. IP rules are ignored. IP Rules get evaluated when response is received. | ||
| Infoblox Threat Defense will never block *.infoblox.com even if it is explicitly blocked by Security Policy. This is because the domain is trusted and run by Infoblox and is necessary for basic functioning of the service. | Infoblox Threat Defense will never block *.infoblox.com even if it is explicitly blocked by Security Policy. This is because the domain is trusted and run by Infoblox and is necessary for basic functioning of the service. | ||
| Line 46: | Line 48: | ||
| As of NIOS 9.0.1 in Dec 2023: ([[https:// | As of NIOS 9.0.1 in Dec 2023: ([[https:// | ||
| As of NIOS 9.0.7 in Oct 2025 - new column added. Note, running Threat Feeds AND Threat Insight is not supported on TE-1415 and TE-1425. | As of NIOS 9.0.7 in Oct 2025 - new column added. Note, running Threat Feeds AND Threat Insight is not supported on TE-1415 and TE-1425. | ||
| - | ^ Model ^ RPZ Rule Count (NIOS >= 9.0.7) ^ RPZ Rule Count ^ Notes ^ | + | ^ Model ^ RPZ Entry Count (NIOS >= 9.0.7) ^ RPZ Rule Count ^ Notes ^ |
| - | | TE-815 | 6 million RPZ entries | + | | TE-815 | 6M (TI not supported) |
| - | | TE-825 | 6 million RPZ entries| 2 million RPZ entries | + | | TE-825 | 6M (TI not supported) |
| - | | TE-1415 | 12 million RPZ entries| 6 million RPZ entries | + | | TE-1415 | 12M (TI not supported) |
| - | | TE-1425 | 12 million RPZ entries| 8 million RPZ entries | + | | TE-1425 | 12M (TI not supported) |
| - | | TE-2215/ | + | | TE-2215/ |
| - | | TE-4015/ | + | | TE-4015/ |
| - | | **TE-926** | 16 million RPZ entries| 6 million RPZ entries | + | | **TE-926** | 16M (TI not supported) |
| - | | **TE-1516**/ | + | | **TE-1516**/ |
| - | | **TE-2326**/ | + | | **TE-2326**/ |
| ===== Suggested Best Practice for Cloud Based Security Policies ===== | ===== Suggested Best Practice for Cloud Based Security Policies ===== | ||
| Line 191: | Line 193: | ||
| Another nice thing about custom RPZ feeds is that you can pull the data easily to other tool. e.g. dig with correct commands to do a zone transfer. Put that through a small shell script to filter the data into host file format and you can put it on a PiHole. | Another nice thing about custom RPZ feeds is that you can pull the data easily to other tool. e.g. dig with correct commands to do a zone transfer. Put that through a small shell script to filter the data into host file format and you can put it on a PiHole. | ||
| + | |||
| + | ===== IP in Custom List ===== | ||
| + | You can block (or allow) traffic based on answer IP by using Custom list. This can be done for a single IP by adding x.x.x.x/32. If you don't add /32, it will be added automatically when you save the Custom list. You can also add subnets such as y.y.y.y/24. | ||
| + | |||
| ===== RPZ Source ===== | ===== RPZ Source ===== | ||
| Line 322: | Line 328: | ||
| * **Block** - Contains entries that should be blocked with confidence given the level of protection needed (e.g. low protection for public wifi and extreme protection for the military) | * **Block** - Contains entries that should be blocked with confidence given the level of protection needed (e.g. low protection for public wifi and extreme protection for the military) | ||
| * **Log** - Goes along with the aligned **Block** list but contains entries that don't have as high a confidence level. | * **Log** - Goes along with the aligned **Block** list but contains entries that don't have as high a confidence level. | ||
| + | |||
| + | ===== NSDNAME and NSIP ===== | ||
| + | |||
| + | Disable NSDNAME/ | ||
| + | |||
| + | RPZ NSDNAME (Name Server Domain Name) | ||
| + | * Definition: This trigger matches the domain name of the authoritative name server (found in the NS records) during recursive resolution. | ||
| + | * Use Case: If a malicious actor uses ns1.badactor.com to host 5,000 phishing websites, you can create an RPZ rule targeting ns1.badactor.com.rpz-nsdname. Any domain utilizing that name server will be blocked. | ||
| + | * Key Advantage: It catches new malicious domains immediately, | ||
| + | |||
| + | RPZ NSIP (Name Server IP Address) | ||
| + | * Definition: This trigger matches the actual IP address (IPv4 or IPv6) in the A/AAAA records of name servers associated with domains (glue records). | ||
| + | * Use Case: If a malicious server changes its name (e.g., from ns1.badactor.com to ns1.sneaky.com) but keeps the same IP address (e.g., 192.0.2.55), | ||
| + | * Functionality: | ||
| + | | ||
| + | | ||
| ===== RPZ BAU Syslog on NIOS ===== | ===== RPZ BAU Syslog on NIOS ===== | ||
| In NIOS, you get the following syslog on the member doing the RPZ feed | In NIOS, you get the following syslog on the member doing the RPZ feed | ||
| Line 448: | Line 470: | ||
| * Major = 7 | * Major = 7 | ||
| * Critical = 8 | * Critical = 8 | ||
| + | |||
| + | Official SYSLOG Severity levels | ||
| + | * 0 (Emergency): | ||
| + | * 1 (Alert): Action must be taken immediately (e.g., primary ISP loss). | ||
| + | * 2 (Critical): Critical conditions (e.g., failing hardware, primary application failure). | ||
| + | * 3 (Error): Error conditions, non-urgent failures. | ||
| + | * 4 (Warning): Potential errors if no action is taken (e.g., low disk space). | ||
| + | * 5 (Notice): Unusual but not error conditions, ongoing events. | ||
| + | * 6 (Informational): | ||
| + | * 7 (Debug): Detailed information for developers | ||
| A note on Mitigation Action | A note on Mitigation Action | ||
| Line 469: | Line 501: | ||
| * rpz: ransomware.rpz.infoblox.local: | * rpz: ransomware.rpz.infoblox.local: | ||
| * zone ransomware.rpz.infoblox.local/ | * zone ransomware.rpz.infoblox.local/ | ||
| + | |||
| + | ==== RPZ Transferring Data ==== | ||
| + | When a new copy of the RPZ is downloaded (transferred) | ||
| + | * rpz: bogon.rpz.infoblox.local: | ||
| + | * (re)loaded policy zone ' | ||
| + | * rpz: bogon.rpz.infoblox.local: | ||
| + | |||
| + | You can force a new download with | ||
| + | < | ||
| + | < | ||
infoblox_threat_defense/rpz_feeds.1761559082.txt.gz · Last modified: by bstafford
