Tutorial: Auto-tagging & DNS Sinkhole

  Рет қаралды 15,943

Palo Alto Networks LIVEcommunity

Palo Alto Networks LIVEcommunity

Күн бұрын

This tutorial shows how automated actions can be taken by a Palo Alto Networks firewall in response to any log entry using the (PAN-OS 8+) Auto-Tagging feature. In this video you will see how Auto-Tagging can quarantine a host which has been sinkholed by the AntiSpyware security profile. Typically a host would be sinkholed if it made a DNS query for a domain known to be malicious. Although possible that a user would accidentally perform a DNS lookup of a malicious domain, it is more likely that the DNS request is the result of a malware infection. This video shows how to use the following Palo Alto Networks firewall features to quarantine, notify and enable un-quarantine activities without burdening the firewall operators:
Auto-Tagging
Log Forwarding Profile
Anti-Spyware Security Profile
DNS Sinkhole
Dynamic Address Groups
URL Filtering

Пікірлер: 22
@jensbecker7914
@jensbecker7914 6 жыл бұрын
very well explained! I would recommend to decrease the timeout for admin overrides. Default is set to 15 min. In this time the user/system could try to establish another „sinkhole-session“ which would not be tagged (but blocked anyway;) ). Auto-tagging is a great feature as well as the whole pan os is;) If your DNS is running in another subnet, you need one more security policy above the override rule. Otherwise the session would be blocked by the first DNS packet. This example video is only working because the DNS-Server is running on this windows "client" machine.
@firewaller
@firewaller 6 жыл бұрын
If you have Internal DNS servers the procedure described in the video could isolate your DNS server since it will be the "Attacker" that gets sinkholed in the Threat log. If you have an Internal DNS server you can still use this procedure with a small modification to the procedure. The beauty part about Auto-Tagging is that it works off from anything that generates a log entry. You don’t have to base the Auto-Tagging off from the ( action eq sinkhole ), in this situation I would base it off from the configured sinkhole address and reference the traffic log. This will positively match the infected host and not your DNS server. ( addr.dst in 72.5.65.111 )
@mark33w
@mark33w 3 жыл бұрын
Nice. Thanks for that comment! I specifically went down to the comments to see if anyone noticed this issue. I was wondering why you didn't add the quarantine log forwarding profile to a rule blocking traffic to the synchole address rather than the allow traffic rule. And it totally makes sense changing the log filter match to just match traffic going to the synchole destination address. Thanks for the great video!
@wigevi
@wigevi 3 жыл бұрын
Hi, not sure if I get this right. Basically what's you saying is that the log type should be Traffic instead of threat under Log Forwarding Profile Match list, keep the filter - Action eq sinkhole and under Built in action use Destination address as a Target ? 🙄
@HughJass-jv2lt
@HughJass-jv2lt 3 жыл бұрын
this video was *SMOKE & MIRRORS...* all he's doing is Quaratining his DNS server. FAIL FAIL FAIL Was anyone able to TWEAK the *Log-Forward Profile* to target the SINKHOLE address (instead of 'action eq sinkhole') ?
@Danlovestrivium
@Danlovestrivium 2 ай бұрын
@@HughJass-jv2lt You people don't understand how the sinkhole actually works. The DNS server isn't ever attempting to go to the malicious website. It's ONLY attempting to go the an external name server. The firewall sees the query to an external name server requesting resolution for a domain the firewall recognizes as malicious and responds to the internal name server with a sinkhole IP address set up by the firewall administrator. The ONLY IP address that will EVER get sinkholed is the source IP address that is attempting to connect to the IP address of the sinkhole. Since the internal name server never attempted to reach out to any other server other than the external name server, the internal name server will NEVER attempt to connect to the sinkhole IP address. This will NOT quarantine the DNS server because the DNS server never tried to connect to the malicious site. This isn't how DNS works at all! lmao.
@Danlovestrivium
@Danlovestrivium 2 ай бұрын
The internal DNS server is never attempting to connect to the malicious site. It's attempting to reach out to an external name server. The only time anything will ever hit the sinkhole is when a device attempts to reach out to the sinkhole IP address, which the name server would never attempt to do. The internal DNS server could attempt to query the external name server 1000 times and it would never get quarantined because the internal DNS server is never going to attempt to connect the to malicious site. The firewall is ONLY looking for an attempted connection the the sinkhole IP address, which only the client would be attempting to reach out to because of the query results the internal DNS server gave it. An internal name server doesn't connect to the requested sites on behalf of the client. That's not how DNS works and it's not how the sinkhole feature works either. Now, you could end up quarantining your Web Proxy servers depending on how your network is designed, but name resolution isn't ever what's going to get you sinkholed. It's the actual reaching out to the sinkhole IP address that gets you quarantined.
@MysticalPlacesTurkey
@MysticalPlacesTurkey 5 жыл бұрын
perfect video thank you four your support.If you have PAN, try it.
@richardquintana3769
@richardquintana3769 3 жыл бұрын
Awesome configuration, very useful video.
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 3 жыл бұрын
Glad it was helpful! As always, please be sure to visit the LIVEcommunity to participate in online discussions, read our blogs and see all of the great information that we have there: live.paloaltonetworks.com
@barakgriffis
@barakgriffis 4 жыл бұрын
How could I get a hold of the customized Response Page with the override field mentioned in the video?
@jjhays27
@jjhays27 6 жыл бұрын
Awesomeness!
@RAJ27682
@RAJ27682 4 жыл бұрын
Using Pan-OS 9.1 and facing problem with response page not loading and thus no option for admin override. I have enabled response page under interface management and using redirection on the same interface IP. Anything got changed with 9.1?
@linuxbowling
@linuxbowling 4 жыл бұрын
Remember that if you are accessing a website with https, I believe that you'll need to enable ssl forward proxy decryption in order to get the response page.
@mitchdensley
@mitchdensley 4 жыл бұрын
@@linuxbowling Exactly! SSL Decryption is needed for the override page to be displayed if the site is tls encrypted.
@HughJass-jv2lt
@HughJass-jv2lt 3 жыл бұрын
im gonna have to *rewatch* this one ... lol
@HughJass-jv2lt
@HughJass-jv2lt 3 жыл бұрын
this video was *SMOKE & MIRRORS...* 8:50 all he's doing is Quaratining his DNS server. FAIL FAIL FAIL :\
@HughJass-jv2lt
@HughJass-jv2lt 3 жыл бұрын
Okay... upon further review: 17:00 It's *STEP #3* that needs to be rewritten.... _somehow set the LOGIC to target Destination-ipaddress EQUALS ipaddress-of-sinkhole_ ^assuming this is possible.... then That would do it. This would be a viable solution.
@cnxduo65
@cnxduo65 5 жыл бұрын
Anyway of getting a copy of the customized Response Page ?
@RAJ27682
@RAJ27682 4 жыл бұрын
You can edit, google HTML to word
@play7590
@play7590 6 жыл бұрын
Very useful feature. Can you please provide commands to remove the tag manually..
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 жыл бұрын
Hi! you can manually clear a tag by using this command: clear auto-tag vsys ip tag-dest tags [ ... ]
DNS Sinkhole and DNS Security in PAN OS 9.0 (Learning Happy Hour Episode 13)
26:17
Palo Alto Networks LIVEcommunity
Рет қаралды 14 М.
小丑和白天使的比试。#天使 #小丑 #超人不会飞
00:51
超人不会飞
Рет қаралды 46 МЛН
At the end of the video, deadpool did this #harleyquinn #deadpool3 #wolverin #shorts
00:15
Anastasyia Prichinina. Actress. Cosplayer.
Рет қаралды 20 МЛН
АЗАРТНИК 4 |СЕЗОН 2 Серия
31:45
Inter Production
Рет қаралды 1 МЛН
Discover the BEST Software From Different Countries!
1:10
Tutorial: Understanding the NAT/Security Policy Configuration
12:47
Palo Alto Networks LIVEcommunity
Рет қаралды 106 М.
Credential Theft Prevention (Episode 36) Learning Happy Hour
35:39
Palo Alto Networks LIVEcommunity
Рет қаралды 2,1 М.
No, Einstein Didn’t Solve the Biggest Problem in Physics
8:04
Sabine Hossenfelder
Рет қаралды 162 М.
Palo Alto Networks- DNS Sinkhole
11:42
Jeff Talkington
Рет қаралды 32 М.
Palo Alto Training | HIP Host Information Profiles
21:00
Mode44
Рет қаралды 3,9 М.
DNS Records Explained
14:14
PowerCert Animated Videos
Рет қаралды 310 М.
小丑和白天使的比试。#天使 #小丑 #超人不会飞
00:51
超人不会飞
Рет қаралды 46 МЛН