SV-233869r621666_rule
V-233869
SRG-APP-000516-DNS-000092
IDNS-8X-400011
CAT II
10
1. Navigate to Data Management >> DNS >> Members tab.
2. Select the Grid member identified as running the DNS service and click "Edit".
3. Enable and configure either an Access Control List (ACL) or set of Access Control Entries (ACE).
4. When complete, click "Save & Close" to save the changes and exit the "Properties" screen.
5. Perform a service restart if necessary.
Validation of this configuration item requires review of the network architecture and security configuration in addition to DNS server configuration to verify that external name servers are not accessible from the internal network when a split DNS configuration is implemented.
1. Navigate to Data Management >> DNS >> Members tab.
2. Review the network configuration and access control of each Infoblox member that has the DNS service running.
3. Select each grid member and click "Edit". Review the "Queries" tab to verify that both queries and recursion options are enabled and allowed only from the respective client networks.
If a split DNS configuration is not used, this is not a finding.
If there is no access control configured or access control does not restrict queries and recursion to the respective client network, this is a finding.
V-233869
False
IDNS-8X-400011
Validation of this configuration item requires review of the network architecture and security configuration in addition to DNS server configuration to verify that external name servers are not accessible from the internal network when a split DNS configuration is implemented.
1. Navigate to Data Management >> DNS >> Members tab.
2. Review the network configuration and access control of each Infoblox member that has the DNS service running.
3. Select each grid member and click "Edit". Review the "Queries" tab to verify that both queries and recursion options are enabled and allowed only from the respective client networks.
If a split DNS configuration is not used, this is not a finding.
If there is no access control configured or access control does not restrict queries and recursion to the respective client network, this is a finding.
M
5251