infoblox_threat_defense:security_policy
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revision | |||
| infoblox_threat_defense:security_policy [2026/01/21 09:38] – bstafford | infoblox_threat_defense:security_policy [2026/01/21 09:41] (current) – bstafford | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| ===== Local Resolution ===== | ===== Local Resolution ===== | ||
| - | BloxOne | + | NIOS-X |
| - | B1 Hosts, NIOS DFP and B1 Endpoints can be configured to resolve queries locally on an Application by Application basis as configured in the security policy rule. if B1DDI is purchased, they can also be configured to resolve everything locally and use B1TD for security lookup only. The caveat for NIOS is that local resolution (be it for a single application or for all traffic) requires that the DNS server acting as a DFP must not use root hints. It must be configured to forward all queries to another DNS server (remember, so long as DFP is up and running, the " | + | NIOS-X hosts, NIOS DFP and B1 Endpoints can be configured to resolve queries locally on an Application by Application basis as configured in the security policy rule. If Universal DDI is purchased, they can also be configured to resolve everything locally and use Infoblox Threat Defense |
| ===== Security Policy Precedent ===== | ===== Security Policy Precedent ===== | ||
| - | For any FQDN being queried in B1TD Cloud, if the domain is a CNAME to another FQDN, then the CNAME FQDN is also checked against the security policy. If the original FQDN matches a security policy then the secondary FQDN that is CNAME point to is not checked/is irrelevant because: | + | For any FQDN being queried in Threat Defense |
| * If the original domain is blocked, there is no point in checking the CNAME. | * If the original domain is blocked, there is no point in checking the CNAME. | ||
| * If the original domain is in an allow list, then we assume we must resolve the FQDN regardless. | * If the original domain is in an allow list, then we assume we must resolve the FQDN regardless. | ||
| Line 15: | Line 15: | ||
| Remember the hidden " | Remember the hidden " | ||
| - | Example: If you block '' | + | Example: If you block '' |
| It is also important to remember that if a FQDN query is blocked because of the CNAME used, then the security log will only show the original FQDN and will not indicate that it was blocked because of a CNAME. | It is also important to remember that if a FQDN query is blocked because of the CNAME used, then the security log will only show the original FQDN and will not indicate that it was blocked because of a CNAME. | ||
infoblox_threat_defense/security_policy.1768988314.txt.gz · Last modified: by bstafford
