2496
Views
0
Helpful
2
Replies

Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2018 03:54 PM - edited 02-21-2020 07:32 AM
Is it possible for Firepower to detect data loss via dns tunnels?
Such as what infoblocks can do?
Thanks in advance
Solved! Go to Solution.
Labels:
- Labels:
-
NGFW Firewalls
1 Accepted Solution
Accepted Solutions
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2018 11:14 PM
There is no out-of-box solution as Infoblox works. However there are other
built-in ways to protect.
FP - Uses SI to drop traffic against malicious URLs
FP can have a DNS policy to block malicious domains
These two are updated by Cisco global databases. Also, what you can do is
to create a snort rule to look at the number of characters in domain name
and block if it crosses specific threshold which same way how infoblox
works. This is the power of snort.
For example, depending on the size of organization, you can create a rule
to drop any DNS packet with domain name more that 20-characters in the
domain name. Its uncommon to have more than 20 and you can change this
number.
An AES 128-bit key can be expressed as a hexadecimal string with 32
characters. It will require 24 characters in base64.
An AES 256-bit key can be expressed as a hexadecimal string with 64
characters. It will require 44 characters in base64.
Therefore 20 should be a good threshold. In the same snort rule you can
append a rate for example 20 times in 5 mins, etc
built-in ways to protect.
FP - Uses SI to drop traffic against malicious URLs
FP can have a DNS policy to block malicious domains
These two are updated by Cisco global databases. Also, what you can do is
to create a snort rule to look at the number of characters in domain name
and block if it crosses specific threshold which same way how infoblox
works. This is the power of snort.
For example, depending on the size of organization, you can create a rule
to drop any DNS packet with domain name more that 20-characters in the
domain name. Its uncommon to have more than 20 and you can change this
number.
An AES 128-bit key can be expressed as a hexadecimal string with 32
characters. It will require 24 characters in base64.
An AES 256-bit key can be expressed as a hexadecimal string with 64
characters. It will require 44 characters in base64.
Therefore 20 should be a good threshold. In the same snort rule you can
append a rate for example 20 times in 5 mins, etc
2 Replies 2
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-21-2018 11:14 PM
There is no out-of-box solution as Infoblox works. However there are other
built-in ways to protect.
FP - Uses SI to drop traffic against malicious URLs
FP can have a DNS policy to block malicious domains
These two are updated by Cisco global databases. Also, what you can do is
to create a snort rule to look at the number of characters in domain name
and block if it crosses specific threshold which same way how infoblox
works. This is the power of snort.
For example, depending on the size of organization, you can create a rule
to drop any DNS packet with domain name more that 20-characters in the
domain name. Its uncommon to have more than 20 and you can change this
number.
An AES 128-bit key can be expressed as a hexadecimal string with 32
characters. It will require 24 characters in base64.
An AES 256-bit key can be expressed as a hexadecimal string with 64
characters. It will require 44 characters in base64.
Therefore 20 should be a good threshold. In the same snort rule you can
append a rate for example 20 times in 5 mins, etc
built-in ways to protect.
FP - Uses SI to drop traffic against malicious URLs
FP can have a DNS policy to block malicious domains
These two are updated by Cisco global databases. Also, what you can do is
to create a snort rule to look at the number of characters in domain name
and block if it crosses specific threshold which same way how infoblox
works. This is the power of snort.
For example, depending on the size of organization, you can create a rule
to drop any DNS packet with domain name more that 20-characters in the
domain name. Its uncommon to have more than 20 and you can change this
number.
An AES 128-bit key can be expressed as a hexadecimal string with 32
characters. It will require 24 characters in base64.
An AES 256-bit key can be expressed as a hexadecimal string with 64
characters. It will require 44 characters in base64.
Therefore 20 should be a good threshold. In the same snort rule you can
append a rate for example 20 times in 5 mins, etc
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-25-2020 07:37 AM
Hi,
We are looking to implement this feature with blocking of domain-name more than 20 characters, can you give a sample config.
Thanks for your help,
Vikas
