User Tools

Site Tools


infoblox_threat_defense:troubleshooting

Infoblox Threat Defense Troubleshooting

DIG

The thing to know about BloxOne Threat Defense is that you can use DIG to get data on what is being resolved using

dig @52.119.41.100 <DOMAIN_YOU_WANT_DATA_ON>.debug.infoblox.com ch txt
DOMAIN=google.com
dig @52.119.41.100 $DOMAIN.debug.infoblox.com ch txt | grep Ident | sed s/\"/\\n/g | grep CAT
dig @52.119.41.100 $DOMAIN.debug.infoblox.com ch txt | grep Ident | sed s/\"/\\n/g | grep APP
DOMAIN=google.com
alias ibcat='dig @52.119.41.100 $DOMAIN.debug.infoblox.com ch txt | grep Ident | sed s/\"/\\n/g | grep CAT'
alias ibapp='dig @52.119.41.100 $DOMAIN.debug.infoblox.com ch txt | grep Ident | sed s/\"/\\n/g | grep APP'


ibcat() {
    dig @52.119.41.100 $1.debug.infoblox.com ch txt | grep Ident | sed s/\"/\\n/g | grep CAT
}
ibapp() {
    dig @52.119.41.100 $1.debug.infoblox.com ch txt | grep Ident | sed s/\"/\\n/g | grep APP
}
nslookup -type=txt -class=chaos outlook.office365.com.debug.infoblox.com 52.119.41.100

Also know that *.infoblox.com and ntp.ubuntu.com are on the PASSTHRU list in the cloud which means it is expected that the Web Category comes back as Unknown - not because it is actually unknown but because the web categorisation engine doesn't process it.

Debug NIOS with DFP enabled

set expertmode on
dig @127.0.0.1 -p 1024 google.com
dig @127.0.0.1 -p 1024 google.com.debug.infoblox.com ch txt

infoblox.com

dig @127.0.0.1 A my-ip.debug.infoblox.com

The TXT includes the region

dig @127.0.0.1 TXT my-ip.debug.infoblox.com

To see what region you are using

dig @52.119.41.100 TXT my-ip.debug.infoblox.com | grep TXT | grep 0 | awk -F "\""  '{print $2}' | awk -F "/" '{print $2}'
dig @52.119.41.100 google.com.debug.infoblox.com ch txt
;; ANSWER SECTION:
csp.infoblox.com.debug.infoblox.com. 0 CH TXT   "Ident: eu-west-2/coredns-5dc6c84d54-nmzjs" "Passthrough: yes"
dig @52.119.41.100 ntp.ubuntu.com.debug.infoblox.com ch txt
;; ANSWER SECTION:
ntp.ubuntu.com.debug.infoblox.com. 0 CH TXT     "Ident: eu-west-2/coredns-c75744d56-n8xbb" "Passthrough: yes"

NSlookup is

nslookup
server 52.119.40.100
set class=chaos
set type=txt
login.microsoftonline.com.debug.infoblox.com

Office365.com

dig @52.119.41.100 outlook.office365.com.debug.infoblox.com ch txt

to get

Ident: eu-west-2/coredns-c123123aa-aaaaa
 
PDP response 
{
	Effect: Permit, 
	Obligations: 
	[
		policy_action: allow, 
		ttype: 1, 
		tag: APP_Microsoft Outlook, 
		policy_id: 012345ab, 
		customer_id: 123456780abcdefg1234567890abcdef, 
		revision: 01234, 
		ecs: 1, 
		all_tags: \"CAT_Web-based Email\",\"APP_Microsoft Outlook\"
	]
}

Domain resolution: resolved

PDP response 
{
	Effect: Permit, 
	Obligations:
	[
		policy_action: allow, 
		ttype: 1, 
		tag: APP_Microsoft Outlook, 
		policy_id: 012345ab, 
		customer_id: 123456780abcdefg1234567890abcdef, 
		revision: 01234, 
		ecs: 1, 
		all_tags: \"APP_Uncategorized\"
	]
}

PDP response 
{
	Effect: Permit
	Obligations: 
	[
		policy_action: allow, 
		ttype: 1,
		tag: APP_Microsoft Outlook, 
		policy_id: 012345ab, 
		customer_id: 123456780abcdefg1234567890abcdef, 
		revision: 01234, 
		ecs: 1, 
		all_tags: \"APP_Uncategorized\"
	]
}

PDP response 
{
	Effect: Permit, 
	Obligations: 
	[
		policy_action: allow, 
		ttype: 1, 
		tag: APP_Microsoft Outlook, 
		policy_id: 012345ab, 
		customer_id: 123456780abcdefg1234567890abcdef, 
		revision: 01234, 
		ecs: 1, 
		all_tags: \"APP_Uncategorized\"
	]
}

PDP response 
{
	Effect: Permit, 
	Obligations: 
	[
		policy_action: allow, 
		ttype: 1, 
		tag: APP_Microsoft Outlook, 
		policy_id: 012345ab, 
		customer_id: 123456780abcdefg1234567890abcdef, 
		revision: 01234, 
		ecs: 1, 
		all_tags: \"APP_Uncategorized\"
	]
}

and

tracert -d 52.119.41.100

Count Number of Members

In a tech support file, run the following on iptables.txt (note the two spaces). to find the list of Grid Members that are not the GM.

cat iptables.txt | grep "LOGACCEPT  all"

HA

Disable STP, Trunking, EtherChannel, IGMP Snooping, DHCP Snooping, Port Channeling.

Looking for Threats

To show detected DNS threats in the NIOS Logs (Administration > Logs > Syslog > View Member), apply the following filters

  • Server equals DNS
  • Message contains CEF

To show DNS queries that worked from a specific client

  • IN AAAA response: NOERROR
  • IN A response: NOERROR
  • client 192.168.99.216

To show DNS queries that worked from a specific client

  • IN AAAA response: NXDOMAIN
  • IN A response: NXDOMAIN
  • client 192.168.99.216

To Show Dynamic DNS

  • Added reverse map
  • Added reverse map

To Show Renew Requests

  • RENEW

DHPC With Dynamic DNS

DHCPDISCOVER from 10:0b:a9:11:11:11 via <DHCP RELAY IP> TransID 13c8cab7
DHCPOFFER on <OFFERED IP> to 10:0b:a9:11:11:11 (HOSTNAME) via eth1 relay <DHCP RELAY IP> lease-duration 119 offered-duration 3600
r-l-e:192.168.1.123,Issued,HOSTNAME,10:0b:a9:11:11:11,1644784034,1644787634,505,$default,192.168.99.192,27,192.168.99.194-192.168.99.222
DHCPREQUEST for <OFFERED IP> from 10:0b:a9:11:11:11 (HOSTNAME) via <DHCP RELAY IP> TransID 13c8cab7
DHCPACK on <OFFERED IP> to 10:0b:a9:bc:11:11 (HOSTNAME) via eth1 relay <DHCP RELAY IP> lease-duration 3600
Added reverse map from 11.1.168.192.in-addr.arpa. to hostname.example.com
Added new forward map from hostname.example.com to 192.168.1.11

What DHCP Peer Sees

DHCPDISCOVER from 10:0b:a9:11:11:11 via <IP OF RELAY> TransID 13c8c111: load balance to peer NAME-OF-FAILOVER-ASSOCIATION (1601720004ps)
DHCPREQUEST for <REQUESTED IP> (IP of DHCP Peer Server) from 10:0b:a9:11:11:11 via <IP OF RELAY> TransID 13c8cab7 uid 01:00:04:30:11:11:11: lease owned by peer

DHCP Renew

DHCPREQUEST for 192.168.1.11 from c6:38:38:11:11:11 (HOSTNAME) via eth1 TransID b1e9a111 uid 01:c6:38:38:11:11:11 (RENEW)
DHCPACK on 192.168.1.11 to c6:38:38:11:11:11 (HOSTNAME) via eth1 relay eth1 lease-duration 3600 (RENEW) uid 01:c6:38:38:11:11:11

Dynamic DNS Update Failure

Reverse map update for 192.168.1.11 abandoned because of non-retryable failure: REFUSED
Unable to add forward map from hostname.domain.com to 192.168.1.11: REFUSED

Dynamic DNS Update Failure

Reverse map update for 192.168.1.11 abandoned because of non-retryable failure: NXRRSET
Forward map from hostname.domain.com to 192.168.1.11 FAILED: Has an address record but no DHCID, not mine.

DHPC Release

DHCPRELEASE of 192.168.11.11 from 10:0b:a9:11:11:11 (HOSTNAME) via eth1 (found) TransID 21881111
infoblox_threat_defense/troubleshooting.txt · Last modified: by bstafford