infoblox_threat_defense:rpz_feeds
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_threat_defense:rpz_feeds [2025/11/12 12:08] – [RPZ Sizing] bstafford | infoblox_threat_defense:rpz_feeds [2026/03/08 18:43] (current) – [NSDNAME and NSIP] bstafford | ||
|---|---|---|---|
| Line 328: | Line 328: | ||
| * **Block** - Contains entries that should be blocked with confidence given the level of protection needed (e.g. low protection for public wifi and extreme protection for the military) | * **Block** - Contains entries that should be blocked with confidence given the level of protection needed (e.g. low protection for public wifi and extreme protection for the military) | ||
| * **Log** - Goes along with the aligned **Block** list but contains entries that don't have as high a confidence level. | * **Log** - Goes along with the aligned **Block** list but contains entries that don't have as high a confidence level. | ||
| + | |||
| + | ===== NSDNAME and NSIP ===== | ||
| + | |||
| + | Disable NSDNAME/ | ||
| + | |||
| + | RPZ NSDNAME (Name Server Domain Name) | ||
| + | * Definition: This trigger matches the domain name of the authoritative name server (found in the NS records) during recursive resolution. | ||
| + | * Use Case: If a malicious actor uses ns1.badactor.com to host 5,000 phishing websites, you can create an RPZ rule targeting ns1.badactor.com.rpz-nsdname. Any domain utilizing that name server will be blocked. | ||
| + | * Key Advantage: It catches new malicious domains immediately, | ||
| + | |||
| + | RPZ NSIP (Name Server IP Address) | ||
| + | * Definition: This trigger matches the actual IP address (IPv4 or IPv6) in the A/AAAA records of name servers associated with domains (glue records). | ||
| + | * Use Case: If a malicious server changes its name (e.g., from ns1.badactor.com to ns1.sneaky.com) but keeps the same IP address (e.g., 192.0.2.55), | ||
| + | * Functionality: | ||
| + | | ||
| + | | ||
| ===== RPZ BAU Syslog on NIOS ===== | ===== RPZ BAU Syslog on NIOS ===== | ||
| In NIOS, you get the following syslog on the member doing the RPZ feed | In NIOS, you get the following syslog on the member doing the RPZ feed | ||
| Line 454: | Line 470: | ||
| * Major = 7 | * Major = 7 | ||
| * Critical = 8 | * Critical = 8 | ||
| + | |||
| + | Official SYSLOG Severity levels | ||
| + | * 0 (Emergency): | ||
| + | * 1 (Alert): Action must be taken immediately (e.g., primary ISP loss). | ||
| + | * 2 (Critical): Critical conditions (e.g., failing hardware, primary application failure). | ||
| + | * 3 (Error): Error conditions, non-urgent failures. | ||
| + | * 4 (Warning): Potential errors if no action is taken (e.g., low disk space). | ||
| + | * 5 (Notice): Unusual but not error conditions, ongoing events. | ||
| + | * 6 (Informational): | ||
| + | * 7 (Debug): Detailed information for developers | ||
| A note on Mitigation Action | A note on Mitigation Action | ||
infoblox_threat_defense/rpz_feeds.1762949287.txt.gz · Last modified: by bstafford
