Understanding Firepower DNS Policies
One cool feature added with Firepower version 6 is probably best described as DNS-based Security Intelligence, Inspection and Sinkholing. The thought is pretty simple. If a host issues a DNS request for a host that is known to be malicious, that response is manipulated. The manipulated response can be host not found, an alternative IP address or no response at all. This allows an administrator to provide another layer of protection by preventing hosts ready access to the IP addresses of known malicious hosts.
So the first question that might come to mind is how are hosts on the Internet classified as bad. The short answer is that Talos maintains lists of known bad fully qualified domain names (fqdn). These are actually categorized and delivered into the Firepower solution as a feed. Each of the following category can be selected into one or multiple DNS Rules.
DNS Feeds and Lists
- DNS Attackers
- DNS Bogons
- DNS Bots
- DNS CnC
- DNS Dga
- DNS Exploitkit
- DNS Malware
- DNS Open_proxy
- DNS Open_relay
- DNS Phishing
- DNS Response
- DNS Spam
- DNS Suspicious
- DNS Tor_exit_node
In addition to the above, there are two built in lists that can be controlled by the UI.
- Global-Blacklist-for-DNS
- Global-Whitelist-for-DNS
The final way Continue reading

The attack landscape has broadened.


Martin Fink, CTO of HPE Labs, is retiring.
To serve IoT, SDN will need to grow out.
NB-IoT supports a massive number of devices.