Infoblox Deployment Guide Advanced DNS Protection
Infoblox Deployment Guide Advanced DNS Protection
NIOS 8.4
Table of Contents
You can deploy the Advanced DNS Protection solution on hardware-accelerated appliances (physical
appliances only) as well as software-based appliances (both physical and virtual) in the Grid. Depending on the
appliances you deploy, you must install applicable hardware-based licenses, software subscription licenses or
IB-FLEX capacity-based licensing.
This document is specifically for Software Based Advanced DNS Protection, though some recent NIOS
features like profiles, and ruleset extensions also apply to hardware accelerated solutions.
Note: When referring to ADP, it should be implied the document is discussing appliances with Software ADP
licenses, IB-FLEX, or Physical PT appliances.
Best Practices
When deploying ADP:
• ADP should not be deployed on the same Layer 2 as Clients, or where DHCP requests are broadcast.
For example, in production, we're running our ADP in a /29, or /126 for IPv6
• Clients generate a lot of broadcast, especially port 5353, and other traffic which results in
spurious/useless messages. DHCP broadcasts also create unnecessary noise.
• If you are running DHCP, then the expectation is that you use DHCP relay to the ADP.
• If you are not running DHCP, then the reason for the messages need to be understood and resolved. In
a Lab environment, just disable the rules (set EPS to 0).
• In situations where a volumetric attack may be experienced against recursive servers, it is best to use
LAN2 exclusively for recursion and to also make use of ANYcast.
• Make sure the Grid is using reliable NTP sources, a minimum of 3, and is fully synchronized.
When you disable Enable VPN on MGMT Port setting, upon saving the following pop up is going to appear.
This is a warning to be taken seriously.
ADP Rules
• With the exception of the DHCP system rules in general, and the TCP/UDP rules DNS query without
Recursion Desired, all system rules should be enabled.
• When viewing the rulesets, sort by Order. The Order is the evaluation order of the rules which can prove
useful for debugging and understanding rule deployment.
• Events Per Second (EPS) should either be 0 or 1 so as to reduce the chance of death by syslog. Values
greater than 1 should only be used for short debug sessions. EPS limits the number of syslog entries per
rule per client that can be generated.
• Setting EPS to 0 will prevent syslog messages, but the counts will still be available on the reporting
server.
• Whitelisting should never be used, unless you have total and immediate control over the whitelisted
client, and the reason is to give you a chance to formulate an appropriate remediation.
• Remember that like with a firewall ruleset, the last rule drops all. There must be an explicit pass
somewhere (i.e. don’t disable every rule).
Reporting
• It is recommended to have a Reporting member in the Grid.
• If you have not purchased a Reporting Member, you can consider deploying the free version.
• Remember to enable the security index.
System alerts
A Grid Master is able to generate SNMP and email alerts. Since these are real time, they should be configured
for the categories that matter.
SIEM
Use of any SIEM (Security Information and Event Management tool) is highly recommended since a great deal
of Syslog information can be generated.
Unresponsive Servers
Recursive servers that aren’t responding tie up resources on members.
ADP Appliances
PT Appliances
The Advanced DNS Protection Appliances are high performance Infoblox network appliances that support the
Infoblox ADP solution. With valid licenses installed, these appliances provide a hardware-accelerated solution
to DNS threats targeting DNS caching and authoritative applications.
Currently, Infoblox offers the IB-4030 physical appliance for Advanced DNS protection and DNS Cache
Acceleration.
The Threat Protection licenses for software ADP are currently limited to following virtual and physical
appliances:
Note: refer to the release notes for your version of NIOS for the most up to date information.
Licensing
• Threat Protection (Software add-on) - A new license feature, which enables the software add-on and is
licensed on a per-appliance basis for appropriate Trinzic appliances.
• Supports the Threat Protection Update license for ADP rule feed.
• Threat Protection (Software add-on) licenses are subscription-based. If the license expires, the service
will continue to work but a license expiry warning will be displayed.
• The following licenses are not supported if the Threat Protection (Software add-on) license is installed on
the same member:
o Multi-Grid Management
o Microsoft Management
• For IB-FLEX appliances, the Threat Protection service and Threat Protection rule feed will be enabled
via the Flex Grid Activation license but licensed via the appropriate SPLA ADP license. Please contact
your Infoblox Sales Representative if you have any questions.
Supported Hypervisors
Software ADP appliances are supported for the following hypervisor environments:
• VMware ESXi 6.5 or later
• OpenStack (KVM) – check the NIOS release notes for the latest information of supported versions
• KVM – check the NIOS release notes for the latest information of supported versions
Deployment Architecture
Threat Protection appliances support standalone or grid member deployments. The Threat Protection feature is
not supported on the Grid Master (GM) or Grid Master Candidate (GMC) servers. Threat Protection Appliances
should always be deployed using out of band management and typically would use anycast for availability and
redundancy. The intent is that any attack traffic should be contained to the network that the LAN1 interface is
connected to.
If reporting is enabled, reporting traffic must be configured to use the management interface.
No extra configuration is needed if the ADP member’s management interface and Reporting member’s LAN1
interface share the same subnet. However, a route needs to be added in the ADP members network
configuration to enable connectivity to the Reporting server if the two are on different subnets.
Deploying ADP
In this deployment guide we are using a Software ADP appliance. The ADP appliance is going to be configured
so that it joins the Grid via its management interface as discussed in the deployment architecture section.
Pick the appropriate Member Type. In our example, it is virtual NIOS (select Infoblox for a physical appliance
and Virtual NIOS for all virtual appliance types). In Step 1 of 3 of the Add Grid Member wizard, select the
correct Member Type. Type any name of your choice in Host Name field. In our example, it is software-
adp.localdomain. Click Next.
Set the appropriate IP address, subnet mask and Gateway information for the member’s LAN1 interface.
Note: The newly added member will show as offline in the Grid Manager > Members Tab.
Click Edit.
Click + > MGMT (IPV4) (Please select the appropriate IP version- v4 or v6).
Click Apply.
You can now view the Management IP address for your server in the general display:
Apply the appropriate license using either the set license or set temp_license command.
set temp_license
The appliance will restart shortly after the NIOS license is applied. Once the server completes the restart
process, add appropriate licenses using set license command. In our example here, we use the set
temp_licenses command multiple times to apply the required licenses:
After Adding Threat Protection (Software add-on) License, the appliance will restart. Log back in once the
restart completes.
Apply the appropriate license to enable the threat protection feature via the set temp_license command.
set network
Note: This IP address must match the IP address configured for the server in the grid that you will be joining it
to. At the Become grid member prompt, enter ‘n’ at this time. You will join it to your Grid using the set
membership command further down in the steps provided here.
The appliance will restart in order to reload its network interfaces. Once complete, log back in and configure the
server's management interface by issuing the following command:
Then enter the appropriate IP address info for the management port (which again must match what has been
set in the Grid which this server will be joining).
In our example we are not using IPv6 addressing. Hence we will not configure it.
Select n for the option Restrict Support and remote console access to MGMT port?
Set membership
Enter the appropriate IP address of the Grid Master LAN1 interface, along with Grid name and Grid Shared
Secret. By default, the Grid name is Infoblox and the shared secret is test. These are case sensitive.
When prompted for Enable grid services on the Management port?, select y. This will enable the server to
join your Grid using its mgmt interface, instead of LAN1 as is done by default.
Enter y at the confirmation prompts.
The server will now attempt to contact Grid Master and synchronize database. Multiple restarts are expected
during this process.
Note: If this ADP is part of a Subscriber Services Site, the DNS resolver should not be inherited from the Grid.
Please review release notes and documentation on Subscriber Services
To start DNS Service, Go to the Grid > Grid Manager > DNS > Services tab.
Select the appropriate ADP member for which the DNS services need to be turned on.
To start Threat Protection Service, Go to the Grid > Grid Manager > Threat Protection > Services tab.
Select the appropriate ADP member for which the Threat Protection service needs to be turned on.
To verify if the Threat Protection service started successfully, check the Services Status column. It must say,
“Threat Protection Service is working”. Click on the refresh button until this updates, as the page is not
refreshed automatically.
The other place where we can view only the ADP appliances under one location is by going to
System Rules
System rules are predefined threat protection rules that are built into ADP. You can enable an entire category
of system rules, as well as individual rules. Although you cannot add or delete system rules, you can change
some parameters, enable and disable. For most system rules, you can also modify the Action and Log
Severity.
Auto Rules
Auto rules are firewall rules that are automatically defined by NIOS for blocking traffic for disabled services and
ports. These rules can be grouped into different rule categories and are enabled or disabled automatically. You
cannot enable or disable autogenerated rules, however, you may be able to set the log severity and control
logging for some of these rules. Autogenerated rules are automatically enabled or disabled and are
reconfigured based on the current running services and the configuration of the appliance.
Custom Rules
Based on your security needs, you can define custom rules using predefined rule templates. Custom rules are
typically whitelisting and blacklisting rules that utilize rate limiting to detect suspicious UDP and TCP traffic. You
can create up to 500 custom rules for each rule template offered by ADP. The appliance logs a syslog
message if there are more than 500 rules for a specific rule category. You can remove some rules in order to
create new ones for that category.
You can add or delete custom rules at the Grid level only. While you cannot add or delete custom rules for Grid
Members and/or profiles, you can enable, disable, and modify some rule parameters at the appropriate place,
which is recommended to be in Profiles.
Add All Members in the Grid in Members Section by clicking + and then select Add Member.
Click OK.
Note: This will contact ts.infoblox.com directly from the Grid Master. If you need to use a proxy server for this
connection, refer to the previous section titled “Proxy Setting”.
A light blue banner displaying the message “Download members test connectivity overall status Success”
will appear if this connection is successful.
Once the download is complete you are going to see the ruleset downloaded under;
For each rule you create, you can define the Events per second value to determine the number of events per
second that will be logged for the rule. In our example we are creating a custom rule that will block UDP DNS
queries for domain foo.foo.foo.
Click +
Click Next
To verify the custom rule configuration, send a DNS query (dig @<LAN1-IP> foo.foo.foo) to the LAN1 IP
address of the ADP appliance. The query is not going to be resolved as expected and a log message confirms
the query is dropped.
Creating Profiles
The ADP Profiles enables groups of members to have the same tuned ADP rulesets. Previously it was
managed either as a Grid wide ruleset or every single member had to be individually managed. The cloning of
profiles can be used to enable testing of ruleset tuning changes, which allow a rapid and accurate reversion, as
well as implementing change control. Multiple profiles also allow you to match rulesets with customer profile.
For example NATed Enterprise vs subscriber vs customer ISP.
To create a profile,
By default, this field has value inherited from the Grid setting.
By default, Events per Second per Rule is set to 1, to change this you can Click Override and configure the
appropriate value.
Click Properties icon next to the newly created profile in order to assign a member to it,
Click Edit
Click +
Click Publish
Making changes to rules in Profile
One advantage of Profile is to use it to tune rules. In this section we are going to enable a rule that is by default
disabled on the Grid.
Click Yes
Click Publish
Switching between ADP Profiles
It is easy to move member assignments from one ADP profile to another ADP profile. In our example, the
member is assigned to Profile named ADP-Test. If the need is to have member use a different ADP Profile, for
example POC-ADP, then:
On Basic Tab under Threat Protection, you can select a specific ruleset or specific profile.
Click Publish
The expected output is that the server is not going to be reached and the command is going to show the
following output upon execution,
If you are using nslookup instead of dig, then use the following command,
Select the ADP appliance to which the query is sent in Member field.
The following log message confirms that query was received and dropped by design and it verified the correct
configuration of the Infoblox ADP appliance. You can see it in context above, and the message details below.
The widget now shows the percentage of traffic being received and dropped on LAN1 and LAN2 interfaces and
interfaces usage. In addition, it also shows the Security events over time, top 10 rules being hit and the top 10
attackers handled by the appliance.
The number of log messages generated is based on the 'Event per Second' setting in each rule. For example, if
the setting is 5, the appliance generates maximum of five log messages of the same event per second per
client when a rule is hit within the time duration. Following is a sample CEF log message for a ADP rule hit
event,
The logs for Infoblox Advanced DNS Protection appliance can be viewed by going to;
Select the appropriate member from the Member drop down menu.
Select the values of the filter fields as “Server equals Threat Protection” shown in the screenshot below,
To only view CEF messages logged for Threat Protection Rules hit,
Click Apply
The filters can be used to view different levels of log messages, such as CRITICAL, ALERT, INFO etc.
The critical messages can be viewed by setting the filter settings as shown in the screenshot below,
The attacker spoofs client requests to DNS servers to hide the true source of the attacker and direct the
response to the client. Using various techniques, small DNS queries may be turned into a much larger payload
directed at the target network. The following log message has rule id of 130400100. This rule first warns if any
source IP sends UDP DNS packets that contain possible reflection/amplification attacks.
Click on the Active ruleset for the Grid and in Go to field type the rule id 130400100. Click Go
The following log message is generated when ADP receives large ICMP ping packet.
The following log message is generated when ADP receive drops request to a malicious domain.
These notifications can do a myriad number of things, like triggering client remediation with endpoint security
solutions, integration with SOAR solutions, create SOC events, trigger DDoS mitigations, and even opening
Service Now tickets. These notifications are vendor neutral.
Please defer to the NIOS 8.4 Documentation for details on the Infoblox Outbound API. At
https://docs.infoblox.com, search for “Outbound Notification Overview”
Corporate Headquarters | 2390 Mission College Boulevard, Ste. 501 | Santa Clara, CA | 95054
+1.408.986.4000 | info@infoblox.com | www.infoblox.com
© 2019 Infoblox, Inc. All rights reserved. Infoblox logo, and other marks appearing herein are property of Infoblox, Inc. All3other marks
are the property of their respective owner(s).