...
- Configure threat protection rule settings for the Grid, including automatic or manual rule updates, as described in Configuring Grid Security Properties. If your network configuration requires rule updates to go through a proxy server, you can configure the appliance to use a proxy server to send rule updates. For more information, see Configuring Proxy Servers. You can also delegate ruleset updates to specific Grid members and change the default interface to an alternate interface, as described in Configuring Members and Interfaces for Automatic Updates. Define threat protection profiles for the Grid or specific members, as described in Configuring Threat Protection Profiles.
- Optionally, you can do the following:
- Override the default Grid setting that disables multiple DNS requests through one TCP session, as described in Enabling Multiple DNS Requests through a Single TCP Session.
- Modify system rules, as described in Modifying System and Auto Rules.
- Create custom rules using rule templates, as described in Creating Custom Rules0.
After you have successfully set up Infoblox Advanced DNS Protection , you can do the following:
- View the current threat protection rules, as described in Viewing Threat Protection Rules6.
- Modify system and custom threat protection rules, as described in Managing Threat Protection Rules on page 1676.
- Manually upload rule updates, as described in Manually Uploading Rulesets.
- Publish uploaded rule updates, as described in Publishing Rule Updates.
- For manual updates, compare differences between two rulesets and merge parameter changes from an old ruleset into a new one, as described in Comparing and Merging Rulesets.
- Monitor threat protection related events and reports, as described in Monitoring Threat Protection Events onpage 1680.
- Set the threat protection service in monitor mode, as described in Enabling and Disabling Monitoring Mode onpage 1652.
- Add threat protection profiles, as described in Adding Threat Protection Profiles.
- Clone threat protection profiles, as described in Cloning Threat Protection Profiles2.
- Modify threat protection profiles, as described in Modifying Threat Protection Profiles3.
- Merge threat protection profiles, as described in Merging Threat Protection Profiles.
- Inherit Grid rule settings for a threat protection profile, as described in Inheriting Grid Rule Settings on page 1674.
- Delete a threat protection profile, as described in Deleting Threat Protection Profiles.
- View the current threat protection profiles, as described in Viewing Threat Protection Profiles5.