Infoblox Trinzic

Infoblox Trinzic appliances are hardware devices that form the foundation of an organization’s network services and reporting solutions. You can configure this event source to send both DHCP and DNS logs.

Configure DHCP Logs

Before you can configure the InsightIDR event source, you must send Infoblox Trinzic messages to a syslog server from the NIOS appliance.

  1. From the "Grid" tab, select the Grid Manager > Members tab, and then click Grid Properties > Edit from the Toolbar.
  2. In the Grid Properties editor, select the Monitoring tab.
  1. In the "Syslog" section, specify the maximum size for a syslog file. Enter a value between 10 and 300. The default is 300.
  2. Check on the Log to External Syslog Servers checkbox.
  3. Click the + button to add a new server.
  1. In the “Address” field, enter the IP address of the InsightIDR collector.
  2. In the “Transport” field, select whether you want to send logs with TCP or UDP.
  3. From the “Interface” dropdown, select which appliance should be the origin of the Infoblox logs.
  4. From the “Source” dropdown, select which syslog messages you want to receive on the Collector.
  5. In the “Port” field, enter the port you want to use for the DHCP logs.
  6. From the “Severity” dropdown, select the severity filter you want in your logs. The filter options are the following:
    • emerg - Panic or emergency conditions. The system may be unusable.
    • alert - Alerts, such as NTP service failures, that require immediate actions.
    • crit - Critical conditions, such as hardware failures.
    • err - Error messages, such as client update failures and duplicate leases.
    • warning - Warning messages, such as missing keepalive options in a server configuration.
    • notice - Informational messages regarding routine system events, such as “starting BIND."
    • info - Informational messages, such as DHCPACK messages and discovery status.
    • debug - Messages that contain information for debugging purposes, such as changes in the latency.
  7. Check the Copy Audit Log Messages to Syslog checkbox to include audit log messages it sends to the syslog server.
  8. Select an option from the Syslog Facility dropdown that determines the processes and daemons from which the log messages are generated.
  9. Click the Save & Close button to save the configuration and click the Restart button if it appears at the top of the screen.

This configuration will parse Infoblox Trinzic as both DHCP and DNS.

If you ONLY want to send DNS logs, configure this event source as a DNS event source following the instructions below.

However, if you configure Infoblox Trinizic as a DHCP event source with DNS configured, and configure a separate DNS event source, your DNS events will be duplicated.

Configure DNS Logs

Infoblox Trinzic also supports DNS logs. However, you must configure DNS through the Infoblox Data Connector with these instructions: https://www.infoblox.com/wp-content/uploads/infoblox-deployment-guide-implementing-infoblox-data-connector-3.pdf

Follow the instructions to:

  1. Install the Infoblox Data Connector
  2. Deploy the Infoblox Data Connector

You do not need to follow the instructions for the SIEM Integration.

When deploying the Data Connector, configure the external server as your InsightIDR Collector.

For further details, see page 1015 from their documentation here: http://dloads.infoblox.com/direct/appliance/NIOS/NIOS_AdminGuide_6.10.pdf.

How to Configure This Event Source

  1. From your dashboard, select Data Collection on the left hand menu.
  2. When the Data Collection page appears, click the Setup Event Source dropdown and choose Add Event Source.
  3. From the “Security Data” section, click the DHCP icon. The “Add Event Source” panel appears.
  4. Choose your collector and event source. You can also name your event source if you want.
  5. Choose the timezone that matches the location of your event source logs.
  6. Optionally choose to send unfiltered logs.
  7. Configure any Advanced Event Source Settings.
  8. Configure inactivity timeout threshold in minutes.
  9. Select a collection method.
    • Optionally choose to Encrypt the event source if choosing TCP by downloading the Rapid7 Certificate.
  10. Click Save.