New Infoblox Feeds
...
Feed Availability | ||||
---|---|---|---|---|
Feed Name | Essentials | Business On-Prem | Business Cloud | Advanced |
Infoblox Base | ✔ | ✔ | ✔ | ✔ |
Infoblox Base IP | NA | ✔ | ✔ | ✔ |
Infoblox High Risk | NA | NA | NA | ✔ |
Infoblox Medium Risk | NA | NA | NA | ✔ |
Infoblox Low Risk | NA | NA | NA | ✔ |
Infoblox Informational | NA | ✔ | ✔ | ✔ |
For information on the new RPZ feed recommendations for NIOS, see Feed Revamp for NIOS.
...
To view your upgraded security policy rules, select a security policy and click on the three horizontal bars icon associated with it. From among the available options, click the Edit option followed by clicking the Policy Rules side menu item of the Edit Policy wizard. The upgraded security policy configuration will be displayed.
...
Restricted Workflows for Old Security Policies Prior to Upgrading
Before upgrading a security policy, you won't be able to modify the current security policy configuration. While you can still view your existing security policies, making changes to non-upgraded policies will not be possible. Once you upgrade a current security policy, you will once again have the ability to edit and update it. When attempting to edit or change a non-upgraded security policy, the Finish button will be disabled.
Additionally, if you attempt to edit the Policy Rules page, then the Save & Close button on the Summary page will be disabled. However, you will still be able to view the policy configuration.
...
Logic for Upgrade Script
Logic for Upgrade Script | |||
Step 1: | |||
Logic Used: | |||
Case 1A (Best: No mix, all Block) | New Action | ||
Base Hostnames | Block | ||
AntiMalware | Block | Infoblox Base | Block |
Malware DGA hostnames | Block | ||
Ransomware | Block | ||
Case 1B (Best: No Mix, all Allow) | New Action | ||
Base Hostnames | Allow | ||
AntiMalware | Allow | Infoblox Base | Allow |
Malware DGA hostnames | Allow | ||
Ransomware | Allow | ||
Case 2 (possible: 1-2 mixed) | New Action | ||
Base Hostnames | Block | ||
AntiMalware | Block | Infoblox Base | Block |
Malware DGA hostnames | Allow | ||
Ransomware | Block | ||
Case 3 (Worst: Most mixed) | New Action | ||
Base Hostnames | Allow | ||
AntiMalware | Block | Infoblox Base | Block |
Malware DGA hostnames | Allow | ||
Ransomware | Allow | ||
Step 2: | |||
Logic Used: | |||
New Action | Retained as is (in same precedence with same action), no change | ||
Antimalware IP | Infoblox Base IP | ||
Step 3: | |||
Logic Used: | |||
Case 1A: (Best: No mix, all Block) | New Action | ||
Suspicious | Block | Infoblox High Risk | Block |
Suspicious Lookalikes | Block | Infoblox Med Risk | Block |
Suspicious NOED | Block | Infoblox Low Risk | Block |
Case 1B: (Best: No Mix, all Allow) | New Action | ||
Suspicious | Allow | Infoblox High Risk | Allow |
Suspicious Lookalikes | Allow | Infoblox Med Risk | Allow |
Suspicious NOED | Allow | Infoblox Low Risk | Allow |
Case 2: (Possible: 1 mixed) | New Action | ||
Suspicious | Block | Infoblox High Risk | Block |
Suspicious Lookalikes | Allow | Infoblox Med Risk | Block |
Suspicious NOED | Allow | Infoblox Low Risk | Allow - with Log |
Case 3: (Worst: 2 mixed) | New Action | ||
Suspicious | Block | Infoblox High Risk | Block |
Suspicious Lookalikes | Allow | Infoblox Med Risk | Block |
Suspicious NOED | Block | Infoblox Low Risk | Allow - with Log |
Step 4: | |||
Logic Used: | |||
New Action | Retained as is (in same precedence with same action), no change | ||
NOED | Infoblox Informational |
...