Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Version History

« Previous Version 12 Next »

For each policy rule, such as custom lists, feed and Threat Insight, and category and application filters, you can define the action or override it as one of the following:

  • Allow – With Log: Grants traffic access to a domain or IP address that hits a particular feed or security policy, and logs the queries to all relevant reports.
  • Allow – No Log: Grants traffic access to a domain or IP address that hits a particular feed or security policy, but does not log the queries to any reports.
  • Allow - Local Resolution: This rule action is only available when configuring an application filter. It allows web applications to bypass DNS and resolve on the local host.  
  • Block – No Redirect: Denies traffic access to a domain or an IP address if it matches that of a particular feed.
  • Block – Default Redirect: Routes traffic to the default Infoblox page or a custom message that you have configured for the Redirect Page.
  • Block – Redirect – <custom redirect name>: Routes traffic to a destination based on the IP address or domain you have configured for the Redirect Page. For information about how to configure a custom redirect page, see Defining the Redirect Page.

Depending on your subscription level, each feed and Threat Insight policy in the Default Global Policy comes with a default action. 

Recommended Actions

New feed recommendations: It is recommended that you do the following regarding the new feeds:

  • Add Suspicious Domains with one of the policy actions to Block.
  • Add Suspicious Lookalikes with one of the policy actions to  Block.
  • Add Suspicious NOED with one of the policy actions to  Block.

The following table includes the list of feeds that we will be retiring:

Feed

RPZ Name

Retirement Date

Reason

Bot-IP

bot-ip.rpz.infoblox.local

4/1/2023

IP addresses are frequently reused for multiple sites, and blocking the ones associated with such systems ran the high risk of inadvertent blocking (I.E. False Positive). Many indicators here could be blocked in other ways, so the source is blocked in other similar feeds, making this redundant.

Spambot-IP

spambot-ip.rpz.infoblox.local

4/1/2023

ExploitKit_IP

exploitkit-ip.rpz.infoblox.local

June 2023

Ext_ExploitKit_IP

ext-exploitkit-ip.rpz.infoblox.local

June 2023

Ext_TOR_Exit_Node_IP 

ext-tor-exit-node-ip.rpz.infoblox.local

June 2023

NCCIC_Host

nccic-host.rpz.infoblox.local

June 2023

The curation process for these feeds (I.E. removing false positives) frequently left these feeds empty. The ones that remained are present in other feeds, making these feeds redundant.

NCCIC_IP

nccic-ip.rpz.infoblox.local

June 2023


As these feeds are being retired, NIOS platforms will no longer be able to download them.  This may present itself as a problem with the Zone transfer. To avoid this issue, these feeds should be removed as soon as possible. As they have been empty for a long time, there will be no negative effect on the organization’s security posture. This only affects NIOS platforms using these RPZ feeds, as cloud-based configurations are updated automatically.  


Note

Ensure that you understand the ramification when overriding the default action for any threat feeds and Threat Insight rules before you do so.

The following table lists the default actions and precedence for the feeds and Threat Insight in the Default Global Policy:

Feed NameDefault ActionDefault Precedence
AntiMalwareBlock  – No Redirect1
BaseBlock  – No Redirect2
DHS_AIS_DomainBlock  – No Redirect3
Malware_DGABlock  – No Redirect4
RansomwareBlock  – No Redirect5
Suspicious_NOEDBlock  – No Redirect6
Suspicious_LookalikesBlock  – No Redirect7
Suspicious_DomainsBlock  – No Redirect8
AntiMalware_IPAllow – With Log9
BogonAllow – With Log10
DHS_AIS_IPAllow – With Log11
Ext_AntiMalware_IPAllow – With Log12
Ext_Base_AntiMalwareAllow – With Log13
Ext_RansomwareAllow – With Log14
US_OFAC_Sanctions_IP_EmbargoedAllow – With Log15
TOR_Exit_Node_IPAllow – With Log16
Threat Insight-Data ExfiltrationAllow – With Log17
Threat Insight - DGAAllow – With Log18
Threat Insight-DNS MessengerAllow – With Log19
Threat Insight-Fast FluxAllow – With Log20
CryptoCurrencyAllow – With Log21
Spambot_DNSBL_IPAllow – With Log22
NOEDAllow – With Log23
FarSightNODAllow – With Log24
ETQRiskAllow – With Log25
ETQRisk_IPAllow – With Log26
EECN_IPAllow – No Log27
Public_DOHAllow – No Log28
Public_DOH_IPAllow – No Log29

For information on adding and removing feeds from a security policy, see the following: 

  • No labels