Table of Contents

Infoblox Firewall Rules

NIOS Firewall Rules

Here.

Documentation Page

To access the Documentation Page you must allow the following domains

BloxConnect

Election Logic

  1. CSP Connected GM (active node) (i.e. with Join token)
  2. CSP Connected GMC (i.e. with Join token)
  3. CSP Connected Member (i.e. with Join token)
  4. GM with connectivity to CSP
  5. GMC with connectivity to CSP
  6. Member with connectivity to CSP

Rules for Data Connector

When you have the Infoblox Cloud Data Connector (in cloud) “as a service” sending directly cloud-to-cloud to Sentinel/Splunk/etc using HTTPS, then the traffic will come from the following IP that you may need to put in an allowlist in Sentinel/Splunk.

Asset Insights

When configuring public cloud to allow access from Infoblox Portal to your public Cloud API for discovery, you may need to add the following IP to an allow list.

Rules for Endpoint

Documented here and here (best practice).

Infoblox Threat Defense

In some cases, firewalls will block any attempt to resolving DNS other than through DFP running on Infoblox. This can create a chicken-egg situation where NIOS needs to connect to Infoblox to get resolution but can't because it can't resolve *.infoblox.com. This is why the DFP has its own setting for DNS resolver to use and why NIOS/NIOS-X should be permitted access to the Infoblox Anycast IP addresses (see below) on udp-53 and tcp-53.

IPv6 DNS Anycast addresses:

BloxOne Endpoint also uses 52.119.41.53.

Infoblox geo-based Anycast IPs for POPs:

Region IPv4 Address Secondary IPv4 Address Hostname
California (USA) 52.119.41.51 103.80.6.51 us-west-1-geo.threatdefense.infoblox.com
Virginia (USA) 52.119.41.52 103.80.6.52 us-east-1-geo.threatdefense.infoblox.com
London (England) 52.119.41.53 103.80.6.53 eu-west-2-geo.threatdefense.infoblox.com
Frankfurt (Germany) 52.119.41.54 103.80.6.54 eu-central-1-geo.threatdefense.infoblox.com
Mumbai (India) 52.119.41.55 103.80.6.55 ap-south-1-geo.threatdefense.infoblox.com
Tokyo (Japan) 52.119.41.56 103.80.6.56 ap-northeast-1-geo.threatdefense.infoblox.com
Singapore 52.119.41.57 103.80.6.57 ap-southeast-1-geo.threatdefense.infoblox.com
Toronto (Canada) 52.119.41.58 103.80.6.58 ca-central-1-geo.threatdefense.infoblox.com
Sydney (Australia) 52.119.41.59 103.80.6.59 ap-southeast-2-geo.threatdefense.infoblox.com
San Paulo (Brazil) 52.119.41.60 103.80.6.60 sa-east-1-geo.threatdefense.infoblox.com
Bahrain (UAE) 52.119.41.61 103.80.6.61 me-south-1-geo.threatdefense.infoblox.com
Johannesburg (South Africa) 52.119.41.62 103.80.6.62 af-south-1-geo.threatdefense.infoblox.com
Ohio (USA) 52.119.41.63 103.80.6.63 us-east-2-geo.threatdefense.infoblox.com
Hyderabad (India) 52.119.41.64 103.80.6.64 ap-south-2-geo.threatdefense.infoblox.com
Hong Kong 52.119.41.65 103.80.6.65 ap-east-1-geo.threatdefense.infoblox.com

Threat Defense Notes

“52.119.40.100 and 103.80.5.100” are both in the same BGP advertisement. Infoblox AS395363 52.119.40.0/24 and 103.80.5.0/24 (Owned by Infoblox)

“52.119.41.100 and 103.80.6.100” are both in the same BGP advertisement. Amazon AS16509 52.119.41.0/24 and 103.80.6.0/24 (Owned by Infoblox)

The 52.x.x.x addresses are registered in California.

The 103.x.x.x addresses are registered in Japan.

PTR record for each address above is threatdefense.bloxone.infoblox.com

Details of POP on this page.

Global Map of POPs.

Status of POP (and other Infoblox services) on this page.

Asset Insights

API calls to public cloud come from 3.221.42.234.

NIOS-X Firewall Rules

IP Allow List

Public IP List

NIOS-X To Internet

I have also seen NIOS-X virtual servers resolving the following which I think come from the underlying OS

FYI:

To DHCP Partner

Active member of a Advanced Active/Passive HA pair talks to the passive member on tcp-847. Two traffic flows (GRPC and HTTP) run to this port.

Both members of an DHCP HA pair talk to each other on udp-647 (heartbeat).

tcp-647 for Kea HA (also used in hub-spoke Kea HA)

Changing NIOX-X Server IP

When the IP address of a NIOS-X virtual server is changed, for a while after the change the internal docker image will try to access certain ports of the device using the old IP. Therefore you may see, in your network traffic logs, traffic from the new IP to the old IP on the following ports.

NIOS Firewall Rules

Grid Management

Purpose Source Destination Port/Protocol/Application Notes
Grid Key Exchange NIOS Member NIOS GM/GMC udp-2114/infoblox-grid BIDIRECTIONAL
Grid VPN NIOS Member NIOS GM/GMC udp-1194/infoblox-grid BIDIRECTIONAL
Grid Accesss Sys Admin Machines NIOS GM/GMC tcp-443 Web UI Access
Grid Accesss Automation Source NIOS GM/GMC tcp-443 API Access
DNS Resolution NIOS Member DNS Server tcp-53/udp-53/dns Probably needed on GM/GMC. Might not be needed on other members if they don't need to resolve DNS. e.g. might be needed if systems are using FQDN for connecting to external services such as NTP, authentication, syslog, email, DFP, etc
NTP Non-GM/GMC NIOS Member NTP Server udp-123/ntp Probably only needed on GM/GMC. Other members probably syncing time over Grid connection
Reporting Any NIOS Member Reporting NIOS Member tcp-9997 Sending reporting data to Reporting server
Syslog Any NIOS Member Syslog server udp-514/syslog Sending syslog data
SNMP Trap Any NIOS Member SNMP Server tcp-162/udp-162/snmp-trap Sending SNMP Traps
SNMP Probe SNMP Server Any NIOS Member tcp-161/udp-161/snmp Sending SNMP Probes
Email Any NIOS Member SMTP Server tcp-25/smtp Sending email alerts
Ping Anything? Any NIOS Member ICMP echo/ping Allow anything/somthing to ping NIOS
SSH Anything? Any NIOS Member tcp-22/ssh Allow anything/something to SSH to NIOS
SCP NIOS GM/GMC SCP Backup server tcp-22/ssh Allow for SCP backup (can be FTP if absolutely necessary)

Grid Services

Purpose Source Destination Port/Protocol/Application Notes
DNS Query Any client NIOS DNS Members udp-53/tcp-53/dns Clients querying NIOS for DNS
DNS Recursion NIOS DNS Members Anything on the Internet udp-53/tcp-53/dns NIOS using root hints to recurse public DNS
DNS Forwarding NIOS DNS Members Target DNS servers udp-53/tcp-53/dns Target global forwarder or conditional forwarder or primary server for zone transfer
DNS Query Any client NIOS NTP Members udp-123/dns Clients querying NIOS for NTP
DHCP Query Any client NIOS NTP Members udp-67/udp-68/tcp-67/tcp-68/dhcp Clients querying NIOS for DHCP
DHCP Failover NIOS Member in FO NIOS Member in FO tcp-647

Also, you need to remember access

Left to itself with no special config, NIOS will connect on tcp-443 to

When DFP is enabled on NIOS, it also connects to

And obviously it will need access to the Threat Defense Anycast IP addresses (see above):

NIOS will resolve the IP address of the above domains by querying 52.119.40.100 which is a DNS server run by Infoblox and it is authoritative for *.infoblox.com. It is also Infoblox Threat Defense cloud resolving IP if you add your public IP to the list of external networks. This is true even if the NIOS Grid it configured to resolve DNS via other nameservers (e.g. the DNS servers of the Grid itself).

Grid Members need to access each other on the following ports (that function as both destination port and the source port)

Grid members talk to the reporting server (if there is one) on TCP-9997. If MGMT port is enabled on a node, then the node will use that port to communicate with the reporting server (if there is one).

For RPZ feeds being used with Infoblox Threat Defense threat feeds, the Infoblox Grid Secondaries will access the two RPZ IP addresses on tcp-53 and udp-53. If you have nominated a Grid Member as “Lead Secondary”, it will download the RPZ and the other members will download from the Lead Secondary on tcp-53. Note that the Lead Secondary will initiate a session to udp-53 to the other secondary members for notification packets.