STIGQter STIGQter: STIG Summary: Infoblox 8.x DNS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Jan 2021:

Primary authoritative name servers must be configured to only receive zone transfer requests from specified secondary name servers.

DISA Rule

SV-233871r621666_rule

Vulnerability Number

V-233871

Group Title

SRG-APP-000516-DNS-000095

Rule Version

IDNS-8X-400013

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

1. Navigate to the Data Management >> DNS >> Zones tab.
2. Select the zone and click "Edit". Select the "Zone Transfers" tab and configure access control (ACL or Access Control Entries [ACE]) on each grid member that communicates with an external secondary.
3. When complete, click "Save & Close" to save the changes and exit the "Properties" screen.
4. Perform a service restart if necessary.

Check Contents

Infoblox Grid members do not use DNS zone transfers to exchange DNS data within a single Grid. Communication between Grid members is via a distributed database over a secure Virtual Private Network (VPN).

1. Navigate to the Data Management >> DNS >> Zones tab.
2. Review each zone by clicking "Edit" and inspecting the "Name Servers" tab.
3. Note all external DNS servers, those NOT identified as Type "Grid" (Primary or Secondary).
4. Click the "Zone Transfers" tab.
5. Verify that only the external non-Grid DNS servers identified as name servers for the zone or authorized stealth servers are the only systems authorized to perform zone transfers as authorized by a "Named ACL" or "Set of ACEs".
6. When complete, click "Cancel" to exit the "Properties" screen.

If Access Controls Lists (ACLs) are not configured for zone transfers to external non-Grid servers, this is a finding.

Vulnerability Number

V-233871

Documentable

False

Rule Version

IDNS-8X-400013

Severity Override Guidance

Infoblox Grid members do not use DNS zone transfers to exchange DNS data within a single Grid. Communication between Grid members is via a distributed database over a secure Virtual Private Network (VPN).

1. Navigate to the Data Management >> DNS >> Zones tab.
2. Review each zone by clicking "Edit" and inspecting the "Name Servers" tab.
3. Note all external DNS servers, those NOT identified as Type "Grid" (Primary or Secondary).
4. Click the "Zone Transfers" tab.
5. Verify that only the external non-Grid DNS servers identified as name servers for the zone or authorized stealth servers are the only systems authorized to perform zone transfers as authorized by a "Named ACL" or "Set of ACEs".
6. When complete, click "Cancel" to exit the "Properties" screen.

If Access Controls Lists (ACLs) are not configured for zone transfers to external non-Grid servers, this is a finding.

Check Content Reference

M

Target Key

5251

Comments