<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240366#M68880</link>
    <description>&lt;P&gt;I'm seeing sinkhole IP activity on two of my current PA security rules now that I've confirmed logging is enabled on both session start and end. The Block-Sinkhole security rule I've implemented to drop indicates one source address currently hitting the sinkhole IP.&lt;/P&gt;</description>
    <pubDate>Mon, 19 Nov 2018 17:13:12 GMT</pubDate>
    <dc:creator>seanmccoy</dc:creator>
    <dc:date>2018-11-19T17:13:12Z</dc:date>
    <item>
      <title>Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240170#M68814</link>
      <description>&lt;P&gt;&amp;nbsp;I need assistance configuring/verifying if DNS Sinkholing is correct on my PA3020 running PAN-OS 7.1.18.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 18:47:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240170#M68814</guid>
      <dc:creator>seanmccoy</dc:creator>
      <dc:date>2018-11-16T18:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240185#M68820</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66239"&gt;@seanmccoy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Here's the knowledgbase article for it &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGECA0" target="_blank"&gt;HERE&lt;/A&gt;, if you have any specific questions please let us know.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 20:03:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240185#M68820</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-11-16T20:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240190#M68824</link>
      <description>&lt;P&gt;This is what I see when I choose Palo Alto Networks Sinkhole IP from the drop down&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sinkhole.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17571i1999186A3E7679C8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="sinkhole.JPG" alt="sinkhole.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 20:55:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240190#M68824</guid>
      <dc:creator>seanmccoy</dc:creator>
      <dc:date>2018-11-16T20:55:54Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240198#M68831</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66239"&gt;@seanmccoy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Okay so outside of a few customizations it looks like you already have it configured and the IP of the default Palo Alto sinkhole IP is just failing to load. At the bottom of that query is a link to a verification document on how you would verify things are properly sinholing, but you should effectively be getting the response of 72.5.65.111 if you attempt to lookup a host that matches one of the DNS Signatures that are published.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 21:22:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240198#M68831</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-11-16T21:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240200#M68833</link>
      <description>&lt;P&gt;So I followed step 4 of the query and created the security rule with the Palo Alto Default sinkhole address (72.5.65.111) as the destination and moved it to the top. If I look at threat logs I still see my internal DNS servers IP addresses if I filter by app eq sinkhole.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 21:55:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240200#M68833</guid>
      <dc:creator>seanmccoy</dc:creator>
      <dc:date>2018-11-16T21:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240201#M68834</link>
      <description>&lt;P&gt;Anywhere I can verify that Palo Alto sinkhole IP object on the firewall?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 21:59:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240201#M68834</guid>
      <dc:creator>seanmccoy</dc:creator>
      <dc:date>2018-11-16T21:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240208#M68841</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66239"&gt;@seanmccoy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;There really isn't a way to verify the object easily on the firewall, you have to get involved with the XML files that actually make up the device and peek around in the tech support file. If you look at the traffic logs for the sinkhole IP do you see any activity, and have you verified that you've setup logging on the rule you created to deny the traffic?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wouldn't filter on the sinkhole app-id, that's kind of a bad test.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 22:34:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240208#M68841</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-11-16T22:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240366#M68880</link>
      <description>&lt;P&gt;I'm seeing sinkhole IP activity on two of my current PA security rules now that I've confirmed logging is enabled on both session start and end. The Block-Sinkhole security rule I've implemented to drop indicates one source address currently hitting the sinkhole IP.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 17:13:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240366#M68880</guid>
      <dc:creator>seanmccoy</dc:creator>
      <dc:date>2018-11-19T17:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240374#M68882</link>
      <description>&lt;P&gt;I've refreshed the monitor and now it appears my sinkhole rule is dropping any source IP to the destination sinkhole IP. Thanks for all your help. Have a great holiday!&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 17:25:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240374#M68882</guid>
      <dc:creator>seanmccoy</dc:creator>
      <dc:date>2018-11-19T17:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240389#M68884</link>
      <description>&lt;P&gt;One other question is as to what I should be looking into as far as the threat log and the sinkhole type action. I'm still seeing that traffic to a few of my on premise domain controllers.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 17:46:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240389#M68884</guid>
      <dc:creator>seanmccoy</dc:creator>
      <dc:date>2018-11-19T17:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNS sink hole on PA 3050 running PAN-OS 7.1.18</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240403#M68886</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66239"&gt;@seanmccoy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So I'm just guessing on your setup here, but I would expect with what you're seeing the domain controllers are also acting as your DNS servers? If that's the case, it simply means that one of the clients on your network is making DNS requests that match the published DNS Signatures, likely because the requested hostname is malicious in nature.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unless you have a way to see the actual host -&amp;gt; DNS traffic, or you are loggign the DNS requests on the server, you really won't get a huge amount of actionable data. As of this moment the only thing you know for sure is that someone in your network is causing the DNS servers to make malicious DNS requests; without additional logs that isn't extremely helpful for you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 18:26:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dns-sink-hole-on-pa-3050-running-pan-os-7-1-18/m-p/240403#M68886</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-11-19T18:26:34Z</dc:date>
    </item>
  </channel>
</rss>

