Tutorial: Auto-tagging & DNS Sinkhole

  Рет қаралды 16,264

Palo Alto Networks LIVEcommunity

Palo Alto Networks LIVEcommunity

Күн бұрын

Пікірлер: 22
@jensbecker7914
@jensbecker7914 6 жыл бұрын
very well explained! I would recommend to decrease the timeout for admin overrides. Default is set to 15 min. In this time the user/system could try to establish another „sinkhole-session“ which would not be tagged (but blocked anyway;) ). Auto-tagging is a great feature as well as the whole pan os is;) If your DNS is running in another subnet, you need one more security policy above the override rule. Otherwise the session would be blocked by the first DNS packet. This example video is only working because the DNS-Server is running on this windows "client" machine.
@firewaller
@firewaller 6 жыл бұрын
If you have Internal DNS servers the procedure described in the video could isolate your DNS server since it will be the "Attacker" that gets sinkholed in the Threat log. If you have an Internal DNS server you can still use this procedure with a small modification to the procedure. The beauty part about Auto-Tagging is that it works off from anything that generates a log entry. You don’t have to base the Auto-Tagging off from the ( action eq sinkhole ), in this situation I would base it off from the configured sinkhole address and reference the traffic log. This will positively match the infected host and not your DNS server. ( addr.dst in 72.5.65.111 )
@mark33w
@mark33w 4 жыл бұрын
Nice. Thanks for that comment! I specifically went down to the comments to see if anyone noticed this issue. I was wondering why you didn't add the quarantine log forwarding profile to a rule blocking traffic to the synchole address rather than the allow traffic rule. And it totally makes sense changing the log filter match to just match traffic going to the synchole destination address. Thanks for the great video!
@wigevi
@wigevi 4 жыл бұрын
Hi, not sure if I get this right. Basically what's you saying is that the log type should be Traffic instead of threat under Log Forwarding Profile Match list, keep the filter - Action eq sinkhole and under Built in action use Destination address as a Target ? 🙄
@HughJass-313
@HughJass-313 3 жыл бұрын
this video was *SMOKE & MIRRORS...* all he's doing is Quaratining his DNS server. FAIL FAIL FAIL Was anyone able to TWEAK the *Log-Forward Profile* to target the SINKHOLE address (instead of 'action eq sinkhole') ?
@Danlovestrivium
@Danlovestrivium 5 ай бұрын
@@HughJass-313 You people don't understand how the sinkhole actually works. The DNS server isn't ever attempting to go to the malicious website. It's ONLY attempting to go the an external name server. The firewall sees the query to an external name server requesting resolution for a domain the firewall recognizes as malicious and responds to the internal name server with a sinkhole IP address set up by the firewall administrator. The ONLY IP address that will EVER get sinkholed is the source IP address that is attempting to connect to the IP address of the sinkhole. Since the internal name server never attempted to reach out to any other server other than the external name server, the internal name server will NEVER attempt to connect to the sinkhole IP address. This will NOT quarantine the DNS server because the DNS server never tried to connect to the malicious site. This isn't how DNS works at all! lmao.
@Danlovestrivium
@Danlovestrivium 5 ай бұрын
The internal DNS server is never attempting to connect to the malicious site. It's attempting to reach out to an external name server. The only time anything will ever hit the sinkhole is when a device attempts to reach out to the sinkhole IP address, which the name server would never attempt to do. The internal DNS server could attempt to query the external name server 1000 times and it would never get quarantined because the internal DNS server is never going to attempt to connect the to malicious site. The firewall is ONLY looking for an attempted connection the the sinkhole IP address, which only the client would be attempting to reach out to because of the query results the internal DNS server gave it. An internal name server doesn't connect to the requested sites on behalf of the client. That's not how DNS works and it's not how the sinkhole feature works either. Now, you could end up quarantining your Web Proxy servers depending on how your network is designed, but name resolution isn't ever what's going to get you sinkholed. It's the actual reaching out to the sinkhole IP address that gets you quarantined.
@MysticalPlacesTurkey
@MysticalPlacesTurkey 5 жыл бұрын
perfect video thank you four your support.If you have PAN, try it.
@richardquintana3769
@richardquintana3769 4 жыл бұрын
Awesome configuration, very useful video.
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 жыл бұрын
Glad it was helpful! As always, please be sure to visit the LIVEcommunity to participate in online discussions, read our blogs and see all of the great information that we have there: live.paloaltonetworks.com
@barakgriffis
@barakgriffis 4 жыл бұрын
How could I get a hold of the customized Response Page with the override field mentioned in the video?
@RAJ27682
@RAJ27682 4 жыл бұрын
Using Pan-OS 9.1 and facing problem with response page not loading and thus no option for admin override. I have enabled response page under interface management and using redirection on the same interface IP. Anything got changed with 9.1?
@linuxbowling
@linuxbowling 4 жыл бұрын
Remember that if you are accessing a website with https, I believe that you'll need to enable ssl forward proxy decryption in order to get the response page.
@mitchdensley
@mitchdensley 4 жыл бұрын
@@linuxbowling Exactly! SSL Decryption is needed for the override page to be displayed if the site is tls encrypted.
@cnxduo65
@cnxduo65 5 жыл бұрын
Anyway of getting a copy of the customized Response Page ?
@RAJ27682
@RAJ27682 4 жыл бұрын
You can edit, google HTML to word
@jjhays27
@jjhays27 6 жыл бұрын
Awesomeness!
@HughJass-313
@HughJass-313 3 жыл бұрын
im gonna have to *rewatch* this one ... lol
@HughJass-313
@HughJass-313 3 жыл бұрын
this video was *SMOKE & MIRRORS...* 8:50 all he's doing is Quaratining his DNS server. FAIL FAIL FAIL :\
@HughJass-313
@HughJass-313 3 жыл бұрын
Okay... upon further review: 17:00 It's *STEP #3* that needs to be rewritten.... _somehow set the LOGIC to target Destination-ipaddress EQUALS ipaddress-of-sinkhole_ ^assuming this is possible.... then That would do it. This would be a viable solution.
@play7590
@play7590 6 жыл бұрын
Very useful feature. Can you please provide commands to remove the tag manually..
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 жыл бұрын
Hi! you can manually clear a tag by using this command: clear auto-tag vsys ip tag-dest tags [ ... ]
Tutorial: Understanding the NAT/Security Policy Configuration
12:47
Palo Alto Networks LIVEcommunity
Рет қаралды 108 М.
Palo Alto Networks- DNS Sinkhole
11:42
Jeff Talkington
Рет қаралды 32 М.
Smart Sigma Kid #funny #sigma
00:33
CRAZY GREAPA
Рет қаралды 37 МЛН
Tutorial: How To Configure a Custom App-ID
14:24
Palo Alto Networks LIVEcommunity
Рет қаралды 38 М.
What are you going to do in 2023? Tops 5 skills to get!
18:56
David Bombal
Рет қаралды 2,4 МЛН
Tutorial: Configuring Your Security Policy
14:13
Palo Alto Networks LIVEcommunity
Рет қаралды 38 М.
FREE Domain and SSL for Local Network | Nginx Proxy Manager on Docker - #13
16:22
Tech - The Lazy Automator
Рет қаралды 68 М.
PCNSE Prep - Functions and Concepts of WildFire
11:45
Palo Alto Networks LIVEcommunity
Рет қаралды 26 М.
Tutorial: Searching Through Logs: Where Do I Start?
15:00
Palo Alto Networks LIVEcommunity
Рет қаралды 25 М.
Video Tutorial: Zone Protection Profiles
16:51
Palo Alto Networks LIVEcommunity
Рет қаралды 32 М.
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 158 М.