Cisco Firepower: How To Configure Security Intelligence DNS Policy for Filtering

Overview

  • Cisco use Talos for Security Intelligence
  • special FTD designed to quickly drop certain traffic.
    • traffic originated by known malicious sources
      • IP address, URL and domains
  • Improve performance early phase of ACP

SI sources

  1. feeds: require threat license
  2. Manual list: static IP, URL, domain to blacklist or whitelist.
  3. Dynamic blacklist: update the feed (object → object management → update feeds)

DNS policy

  • enabled domain support for SI
    • support DNS queries for known malicious or unsafe domain.
      • no ip address → no traffic inspected
  • DNS policy consist of whitelist and blacklist.
  • Flow for checking DNS entries policies:
    • FTD will check record in the cache, if no entries it will forward to FMC
    • FMC will check the record in cache, if no entries it will forward or ask to cisco Talos
  • Rule action determine ultimate handling of matching DNS traffic
    • whitelist:
      • passes traffic to the ACP
    • monitor:
      • traffic is logged but still evaluated by other rules
    • Blacklist:
      • Blacklist
      • Domain not found
        • DNS response NXDOMAIN
      • Sinkhole
        • DNS response with false IP
  • Configuration
    1. The system-provided DNS policy is used by default.
    2. Custom policy: policies → access control → DNS

Topology

Testing Scenarios

  1. Block a known source of malware traffic with Security Intelligence, Infected system uses an IP address 200.0.0.2 and is located on the outside.
  2. Configure a new DNS policy, You are certain that a domain “hackers.com” contains malware. Drop all DNS traffic to this domain.
  3. Create sinkhole domain to redirect to ip 1.2.3.4 ipv6 1:2:3::4 , testing using detik.com

Configurations

if you have feed license, you can update source intelligence to latest data from menu:

object --> object management --> network list and feeds
  1. Create new policy dns
policies -> DNS -> add DNS policy

2. Add rule for policy like this:

3. to define rule sinkhole first create object dns sinkhole

object --> object management --> sinkhole

4. Apply the new rule DNS to ACP

policies --> access control --> security intelligence --> change to our policy DNS

Verifications

  1. First we can try from R6 as a inside host to ping hackers.com.

2. if check from FMC we can see hackers.com is blocked

analysis --> connections --> events/security intelligence events 

3. verification for sinkhole domain , we can test from R6 as inside host ping detik.com

from the output above we see the dns request is redirect to IP 1.2.3.4 even the connection to DNS server is established.

we can also check from FMC dashboard to verify

Conclusions

  1. if you have license for feed please update the database and use the categories to block certain domain.
  2. you can also whitelist/blacklist domain without license using manual list.
  3. Sinkhole domain help us to redirect response query ip from dns to other site, for example you can use this to redirect to home company page.

If you found this useful, subscribe to newsletter