- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-22-2022 06:36 PM
Hello all,
I enabled DNS Sinhole on my palo and it is working fine. But now I'm interested in the DNS security license. Please help me understand some things?
According to PA documentation since I have TP\\AV\\WF licenses, when a DNS query is made to a bad site the firewall will check its local DNS signatures which will hold a capacity of 100,000 signatures. So there's a chance that a bad query is not seen.
However with the DNS seurity license, DNS signatures are stored in the cloud, it has an infinite amount of DNS signatures, and the DNS requests are real-time analysis and you get instant access to newly added DNS signatures, no need to wait for a download from your dynamic updates AV.
My questions:
1. When I look at how to enable DNS security from their documentation, it looks exactly like how I have it now with only DNS sinkhole. So I guess I would just add the DNS security license and assume its working?
2. When a DNS query is made from a client on my network, by the time it does a live real-time lookup\\analysis, will the end user see any "lag" on their web request a timeout perhaps?
3. Will the DNS request use the local cache on the firewall (the 100,00 signatures), and if it doesn't find anything, it will then use the cloud, or it goes directly to the cloud?
I wish Palo had more in depth documentation on how these things work\\flow, like a deeper dive.
​
Also, what are your thoughts on DNS security, have you found it to be useful?
03-23-2022 02:17 PM
1) You would see it under objects -> antispyware -> signatures (notice you are missing one)
2) We see sub-25ms response time from the cloud engine on average, this is imperceptible to users.
3) Correct, cache first if no verdict cloud analysis.
4) It is very useful. Think of how great URL Filtering is for your users and web traffic. This service protects the application layer of non-browser based applications (the majority of your infrastructure traffic). See below. This was one of the first indicators we noticed in SolarWinds, FYI.
03-23-2022 02:17 PM
1) You would see it under objects -> antispyware -> signatures (notice you are missing one)
2) We see sub-25ms response time from the cloud engine on average, this is imperceptible to users.
3) Correct, cache first if no verdict cloud analysis.
4) It is very useful. Think of how great URL Filtering is for your users and web traffic. This service protects the application layer of non-browser based applications (the majority of your infrastructure traffic). See below. This was one of the first indicators we noticed in SolarWinds, FYI.
03-25-2022 08:55 AM
Excellent, thank you.
03-25-2022 10:24 AM
Added benefit being it's an inescapable part of your network perimeter. Palo has seen breaches in which URL filtering/DNS security solutions are circumvented simply by changing the client settings of which IP to point to. Thanks to App-ID on the Palo, anything we see as DNS, no matter where it goes, will get analyzed. Can't be evaded. Indispensable to network defense, IMO.
I cover more critical infrastructure type folks, so, this is particularly relevant for them as majority of traffic flows are not web browser based.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!