User Tools

Site Tools


infoblox:ecosystem

This is an old revision of the document!


Infoblox Ecosystem

The Infoblxo Ecosystem licence is a single, Grid wide licence that gets applied to the Grid Master. It enables the Infoblox appliances to initiate API calls to third party vendor appliances (e.g. Palo Alto Networks firewalls).

Initial Setup with Palo Alto Networks

Set the extensible attributes

Grid Manager > Administration > Network Views > default > edit

Add Extensible Attributes default values

  • PaloAlto_Asset_Sync true
  • PaloAlto_Asset_Tag allow
  • PaloAlto_Security_Sync true
  • PaloAlto_Security_Tag deny
  • PaloAlto_Timeout 30

PaloAlto_Asset_SyncedAt and PaloAlto_Security_SyncedAt have no default value

PaloAlto_Asset_Sync and PaloAlto_Security_Sync should have the following list of options

  • true
  • false

To create the Extensible Attributes Grid Manager > Administration > Extenisble Attributes

(No default values)

Name TYPE REQUIRED INHERITANCE COMMENT
PaloAlto_Asset_Sync List No Yes Whether or not syncing asset events with PAN is desired.
PaloAlto_Asset_SyncedAt String No No Timestamp for when the asset is synced with PAN.
PaloAlto_Asset_Tag String No Yes Tag that attaches to an IP to polulate it in a Dynamic Address Group (allow).
PaloAlto_Security_Sync List No Yes Whether or not syncing security events with PAN is desired.
PaloAlto_Security_SyncedAt String No No Timestatmp for when the security event is synced with PAN.
PaloAlto_Security_Tag String No Yes Tag that attaches to an IP to populate it in a Dynamic Address Group (deny).
PaloAlto_Timeout Integer No Yes Starting

with PAN-OS 9.0 a tag can contain an optional timeout attribute. The default is 0 (never expires) or a timeout value in seconds for the tag. The maximum timeout is 2592000 (30 days).

Palo Alto Networks

Remember, you need to create the address groups and tags on teh firewall before configuring infoblox. Also, it is best practice to create a dummy address in each address group as each address group must have at least one object to be valid. The main difference between this code and Infoblox template code is that this code doesn't put objects into “shared”. it assumes no multi-vsys and will put things into /config/devices/entry[@name='localhost.localdomain']/vsys/entry[@name='vsys1']/ instead of /config/shared/

There are two types of templates - session managment and event. Session managment may use event types for some actions (e.g. device login and logout). Session managment templates are assigned to “Outbound Endpoint” configs. This is also where you define variables that can be used in Event types. Event types are assigned to “Notification” configs.

The reason all the Infoblox guides say that you have to enable Multi VSYS is that they inject into “shared” which only exists on Multi VSYS system.

vendor_identifier (e.g. “vendor_identifier”:“Palo Alto”,) has to match a predifined list from Infobox

JSON PATH is at the bottom of the event file.

192.168.99.0/27

Variables in templates (e.g. ${S::infoblox-created-objects}) are deffined in PAN_Session.txt

When you edit PAN_Session.txt, you need to reimport it into Infoblox Grid and then check it under Grid > Ecosystem > Outbound Endpoint > (firewall endpoint) > Session Management.

Then re-import the template that you are editing with the new variable name.

To update the firewall with new host records (IP) when new hosts are added, create the following

PAN_Host_IPv4

Event = Object Change Host Address IPv4
Match the following rule
IPv4 Address matches CIDR 192.168.99.0/27 (This does not have to match a specific subnet, 192.168.0.0/16 would match all subnets within 192.168.0.0/16)
Template = Palo Alto Static Assets

By default, this will create an Address object named after the IP (e.g. IP = 192.168.1.1 Name = 192.168.1.1). No tags. It will be added to the Address Group Iblox_Host_Allow)

FROM DEMO

This is from the Cloud based partner Demo system that Infoblox offers.

The following are the rules for triggers.

PAN_Lease:

Template = Palo Alto Dynamic Assets
Event = DHCP Leases
Match = ANY
Rules:
Network View equals default
Lease State equals Active
Lease State equals Expired
Lease State equals Free
Lease State equals Released
IP Address matches CIDR 172.0.0.0/24

PAN_RPZ:

Template = Palo Alto Dynamic Security
Event = DNS RPZ
Match = ANY
Rules:
Action Policy equals Local Data
Action Policy equals NXDOMAIN
Action Policy equals No Data
Action Policy equals Passthru
Rule Name contains .
Source IP matches CIDR 127.0.1.0/24

PAN_Tunnel:

Template = Palo Alto Dynamic Security
Event = DNS Tunneling
Match = ANY
Source IP matches CIDR 172.0.0.0/8
Source IP matches CIDR 10.0.0.0/24
Source IP matches CIDR fc01::/64

PAN_ADP:

Template = Palo Alto Dynamic Security
Event = Security ADP
Match = ANY
Hits Count is creter than 5
Rule Action equals Alert
Rule Action equals Drop
Rule Action equals Pass
Rule Severity equals Critical
Rule Severity equals Major
Rule Severity equals Warning
Rule Severity equals Informational

PAN_Fixed_IPv6

Template = Palo Alto Dynmaic Assets
Event = Object Change Fixed Address Ipv6
Match the following rule:
Network View contains default

PAN_Host_IPv6

Template = Palo Alto Dynmaic Assets
Event = Object Change Host Address Ipv6
Match the following rule:
Network View contains default

PAN_Fixed_IPv4_Static

Template = Palo Alto Static Assets
Event = Object Change Fixed Address IPv4
Match the following rule:
IPv4 Address matches CIDR 172.0.0.0/24

PAN_Fixed_IPv4_Dynamic

Template = Palo Alto Dynmaic Assets
Event = Object Change Fixed Address IPv4
Match the following rule:
IPv4 Address matches CIDR 10.0.0.0/24

PAN_Host_IPv4_Static

Template = Palo Alto Static Assets
Event = Object Change Host Address IPv4
Match the following rule:
IPv4 Address match CIDR 172.0.0.0/24

PAN_Host_IPv4_Dynamic

Template = Palo Alto Dynamic Assets
Event = Object Change Host Address IPv4
Match the following rule:
IPv4 Address match CIDR 10.0.0.0/24

PAN_Records

Template = Palo Alto Static Records
Event = Object Change DNS Records
Match = ANY
Rules:
Networks View contains default
Zone Name contains .
infoblox/ecosystem.1669809173.txt.gz · Last modified: by bstafford