infoblox_threat_defense:security_policy
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_threat_defense:security_policy [2026/01/21 09:17] – bstafford | infoblox_threat_defense:security_policy [2026/01/21 09:41] (current) – bstafford | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| When you have "Local On-Prem Resolution" | When you have "Local On-Prem Resolution" | ||
| + | ===== Local Resolution ===== | ||
| + | NIOS-X DFP and Endpoints are able to " | ||
| + | NIOS-X hosts, NIOS DFP and B1 Endpoints can be configured to resolve queries locally on an Application by Application basis as configured in the security policy rule. If Universal DDI is purchased, they can also be configured to resolve everything locally and use Infoblox Threat Defense for security lookup only. The caveat for NIOS is that local resolution (be it for a single application or for all traffic) requires that the DNS server acting as a DFP must not use root hints. It must be configured to forward all queries to another DNS server (remember, so long as DFP is up and running, the " | ||
| + | ===== Security Policy Precedent ===== | ||
| + | For any FQDN being queried in Threat Defense Cloud, if the domain is a CNAME to another FQDN, then the CNAME FQDN is also checked against the security policy. If the original FQDN matches a security policy then the secondary FQDN that is CNAME point to is not checked/is irrelevant because: | ||
| + | * If the original domain is blocked, there is no point in checking the CNAME. | ||
| + | * If the original domain is in an allow list, then we assume we must resolve the FQDN regardless. | ||
| + | |||
| + | If you have a security rules that blocks the secondary CNAME domain and that rule is ABOVE any rule that allows the original FQDN or if there simply isn't an explicitly allow rule for the original FQDN, then the query will be blocked because of the block rule for the secondary CNAME. | ||
| + | |||
| + | Remember the hidden " | ||
| + | |||
| + | Example: If you block '' | ||
| + | |||
| + | It is also important to remember that if a FQDN query is blocked because of the CNAME used, then the security log will only show the original FQDN and will not indicate that it was blocked because of a CNAME. | ||
| + | |||
| + | It is almost as if B1TD cloud makes the query first and then checks the domain AND CNAME values against teh security policy. Since the block list is hit first and matches the CNAME redirect, the query is blocked. If it hit the allow list first (for the original domain) it would allow the query and not bother with the CNAME. | ||
| + | |||
| + | So, on receiving a query, | ||
| + | < | ||
| + | THEN block and end | ||
| + | ELSE (i.e. query in allow list OR query is not on a list) | ||
| + | THEN | ||
| + | IF cname in block list AND is ABOVE any existing query allow rule. | ||
| + | THEN block and end | ||
| + | ELSE (i.e. cname is in block list BELOW query allow OR cname is in allow list OR cname is in no list) | ||
| + | THEN allow query, resolve and end</ | ||
| ===== URL Filtering ===== | ===== URL Filtering ===== | ||
| When Infoblox filters a DNS name, it returns one of the following IP addresses | When Infoblox filters a DNS name, it returns one of the following IP addresses | ||
infoblox_threat_defense/security_policy.1768987076.txt.gz · Last modified: by bstafford
