Here.
To access the Documentation Page you must allow the following domains
Election Logic
When you have the Infoblox Cloud Data Connector (in cloud) “as a service” sending directly cloud-to-cloud to Sentinel/Splunk/etc using HTTPS, then the traffic will come from the following IP that you may need to put in an allowlist in Sentinel/Splunk.
When configuring public cloud to allow access from Infoblox Portal to your public Cloud API for discovery, you may need to add the following IP to an allow list.
Documented here and here (best practice).
In some cases, firewalls will block any attempt to resolving DNS other than through DFP running on Infoblox. This can create a chicken-egg situation where NIOS needs to connect to Infoblox to get resolution but can't because it can't resolve *.infoblox.com. This is why the DFP has its own setting for DNS resolver to use and why NIOS/NIOS-X should be permitted access to the Infoblox Anycast IP addresses (see below) on udp-53 and tcp-53.
52.119.41.100 (better services. Based on AWS Anycast/GSLB)103.80.6.100 (better services. Based on AWS Anycast/GSLB)52.119.40.100 (works well but isn't quite as good as the IP addresses above)103.80.5.100 (works well but isn't quite as good as the IP addresses above)52.119.41.120 (for NIOS-X Local On-Prem Resolution feature. infobloxtd.com)103.80.6.120 (for NIOS-X Local On-Prem Resolution feature. infobloxtd.com)52.119.41.200 (DoH IP)103.80.6.200 (DoH IP)IPv6 DNS Anycast addresses:
2400:4840::1002620:129:6000::100
BloxOne Endpoint also uses 52.119.41.53.
Infoblox geo-based Anycast IPs for POPs:
| Region | IPv4 Address | Secondary IPv4 Address | Hostname |
|---|---|---|---|
| California (USA) | 52.119.41.51 | 103.80.6.51 | us-west-1-geo.threatdefense.infoblox.com |
| Virginia (USA) | 52.119.41.52 | 103.80.6.52 | us-east-1-geo.threatdefense.infoblox.com |
| London (England) | 52.119.41.53 | 103.80.6.53 | eu-west-2-geo.threatdefense.infoblox.com |
| Frankfurt (Germany) | 52.119.41.54 | 103.80.6.54 | eu-central-1-geo.threatdefense.infoblox.com |
| Mumbai (India) | 52.119.41.55 | 103.80.6.55 | ap-south-1-geo.threatdefense.infoblox.com |
| Tokyo (Japan) | 52.119.41.56 | 103.80.6.56 | ap-northeast-1-geo.threatdefense.infoblox.com |
| Singapore | 52.119.41.57 | 103.80.6.57 | ap-southeast-1-geo.threatdefense.infoblox.com |
| Toronto (Canada) | 52.119.41.58 | 103.80.6.58 | ca-central-1-geo.threatdefense.infoblox.com |
| Sydney (Australia) | 52.119.41.59 | 103.80.6.59 | ap-southeast-2-geo.threatdefense.infoblox.com |
| San Paulo (Brazil) | 52.119.41.60 | 103.80.6.60 | sa-east-1-geo.threatdefense.infoblox.com |
| Bahrain (UAE) | 52.119.41.61 | 103.80.6.61 | me-south-1-geo.threatdefense.infoblox.com |
| Johannesburg (South Africa) | 52.119.41.62 | 103.80.6.62 | af-south-1-geo.threatdefense.infoblox.com |
| Ohio (USA) | 52.119.41.63 | 103.80.6.63 | us-east-2-geo.threatdefense.infoblox.com |
| Hyderabad (India) | 52.119.41.64 | 103.80.6.64 | ap-south-2-geo.threatdefense.infoblox.com |
| Hong Kong | 52.119.41.65 | 103.80.6.65 | ap-east-1-geo.threatdefense.infoblox.com |
“52.119.40.100 and 103.80.5.100” are both in the same BGP advertisement. Infoblox AS395363 52.119.40.0/24 and 103.80.5.0/24 (Owned by Infoblox)
“52.119.41.100 and 103.80.6.100” are both in the same BGP advertisement. Amazon AS16509 52.119.41.0/24 and 103.80.6.0/24 (Owned by Infoblox)
The 52.x.x.x addresses are registered in California.
The 103.x.x.x addresses are registered in Japan.
PTR record for each address above is threatdefense.bloxone.infoblox.com
Details of POP on this page.
Global Map of POPs.
Status of POP (and other Infoblox services) on this page.
threatdefense.infoblox.com will return 52.119.41.100 and 103.80.6.100geo.threatdefense.infoblox.com will return the Geographically nearest POP to the resolver making the query.
API calls to public cloud come from 3.221.42.234.
I have also seen NIOS-X virtual servers resolving the following which I think come from the underlying OS
FYI:
Active member of a Advanced Active/Passive HA pair talks to the passive member on tcp-847. Two traffic flows (GRPC and HTTP) run to this port.
Both members of an DHCP HA pair talk to each other on udp-647 (heartbeat).
tcp-647 for Kea HA (also used in hub-spoke Kea HA)
When the IP address of a NIOS-X virtual server is changed, for a while after the change the internal docker image will try to access certain ports of the device using the old IP. Therefore you may see, in your network traffic logs, traffic from the new IP to the old IP on the following ports.
| Purpose | Source | Destination | Port/Protocol/Application | Notes |
|---|---|---|---|---|
| Grid Key Exchange | NIOS Member | NIOS GM/GMC | udp-2114/infoblox-grid | BIDIRECTIONAL |
| Grid VPN | NIOS Member | NIOS GM/GMC | udp-1194/infoblox-grid | BIDIRECTIONAL |
| Grid Accesss | Sys Admin Machines | NIOS GM/GMC | tcp-443 | Web UI Access |
| Grid Accesss | Automation Source | NIOS GM/GMC | tcp-443 | API Access |
| DNS Resolution | NIOS Member | DNS Server | tcp-53/udp-53/dns | Probably needed on GM/GMC. Might not be needed on other members if they don't need to resolve DNS. e.g. might be needed if systems are using FQDN for connecting to external services such as NTP, authentication, syslog, email, DFP, etc |
| NTP | Non-GM/GMC NIOS Member | NTP Server | udp-123/ntp | Probably only needed on GM/GMC. Other members probably syncing time over Grid connection |
| Reporting | Any NIOS Member | Reporting NIOS Member | tcp-9997 | Sending reporting data to Reporting server |
| Syslog | Any NIOS Member | Syslog server | udp-514/syslog | Sending syslog data |
| SNMP Trap | Any NIOS Member | SNMP Server | tcp-162/udp-162/snmp-trap | Sending SNMP Traps |
| SNMP Probe | SNMP Server | Any NIOS Member | tcp-161/udp-161/snmp | Sending SNMP Probes |
| Any NIOS Member | SMTP Server | tcp-25/smtp | Sending email alerts | |
| Ping | Anything? | Any NIOS Member | ICMP echo/ping | Allow anything/somthing to ping NIOS |
| SSH | Anything? | Any NIOS Member | tcp-22/ssh | Allow anything/something to SSH to NIOS |
| SCP | NIOS GM/GMC | SCP Backup server | tcp-22/ssh | Allow for SCP backup (can be FTP if absolutely necessary) |
| Purpose | Source | Destination | Port/Protocol/Application | Notes |
|---|---|---|---|---|
| DNS Query | Any client | NIOS DNS Members | udp-53/tcp-53/dns | Clients querying NIOS for DNS |
| DNS Recursion | NIOS DNS Members | Anything on the Internet | udp-53/tcp-53/dns | NIOS using root hints to recurse public DNS |
| DNS Forwarding | NIOS DNS Members | Target DNS servers | udp-53/tcp-53/dns | Target global forwarder or conditional forwarder or primary server for zone transfer |
| DNS Query | Any client | NIOS NTP Members | udp-123/dns | Clients querying NIOS for NTP |
| DHCP Query | Any client | NIOS NTP Members | udp-67/udp-68/tcp-67/tcp-68/dhcp | Clients querying NIOS for DHCP |
| DHCP Failover | NIOS Member in FO | NIOS Member in FO | tcp-647 |
Also, you need to remember access
Left to itself with no special config, NIOS will connect on tcp-443 to
When DFP is enabled on NIOS, it also connects to
And obviously it will need access to the Threat Defense Anycast IP addresses (see above):
NIOS will resolve the IP address of the above domains by querying 52.119.40.100 which is a DNS server run by Infoblox and it is authoritative for *.infoblox.com. It is also Infoblox Threat Defense cloud resolving IP if you add your public IP to the list of external networks. This is true even if the NIOS Grid it configured to resolve DNS via other nameservers (e.g. the DNS servers of the Grid itself).
Grid Members need to access each other on the following ports (that function as both destination port and the source port)
Grid members talk to the reporting server (if there is one) on TCP-9997. If MGMT port is enabled on a node, then the node will use that port to communicate with the reporting server (if there is one).
For RPZ feeds being used with Infoblox Threat Defense threat feeds, the Infoblox Grid Secondaries will access the two RPZ IP addresses on tcp-53 and udp-53. If you have nominated a Grid Member as “Lead Secondary”, it will download the RPZ and the other members will download from the Lead Secondary on tcp-53. Note that the Lead Secondary will initiate a session to udp-53 to the other secondary members for notification packets.