<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: large amounts of DNS traffic in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9293#M1216</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;DNS is often used as the channel for updates (legitimate) as well as data exfiltration (malicious).&lt;/P&gt;&lt;P&gt;Can you tell me which DNS servers you have approved the egress traffic to?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 07 Nov 2017 01:12:47 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2017-11-07T01:12:47Z</dc:date>
    <item>
      <title>large amounts of DNS traffic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9292#M1215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;after upgrading to r80.10, &amp;nbsp;I started seeing some interesting traffic reported as DNS. &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60823_pastedImage_3.png" style="width: 620px; height: 146px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from the individual session&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60822_pastedImage_2.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have DNS locked down to only a few approved servers. &amp;nbsp; We have IPS rule in place to look for DNS tunneling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks &amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Nov 2017 22:14:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9292#M1215</guid>
      <dc:creator>Neil_ZInk</dc:creator>
      <dc:date>2017-11-06T22:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: large amounts of DNS traffic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9293#M1216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;DNS is often used as the channel for updates (legitimate) as well as data exfiltration (malicious).&lt;/P&gt;&lt;P&gt;Can you tell me which DNS servers you have approved the egress traffic to?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Nov 2017 01:12:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9293#M1216</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-11-07T01:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: large amounts of DNS traffic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9294#M1217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;our windows domain controllers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Nov 2017 03:47:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9294#M1217</guid>
      <dc:creator>Neil_ZInk</dc:creator>
      <dc:date>2017-11-07T03:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: large amounts of DNS traffic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9295#M1218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But are your Windows DCs are configured as Recursive DNS servers to allow upstream lookups?&lt;/P&gt;&lt;P&gt;If yes, and there are no rules in the firewalls preventing their egress traffic on port 53, than essentially they are acting as DNS proxies forwarding all requests for non-cached entries further upstream.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Nov 2017 13:33:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9295#M1218</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-11-07T13:33:04Z</dc:date>
    </item>
    <item>
      <title>Re: large amounts of DNS traffic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9296#M1219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They are and I agree with you. &amp;nbsp;10's to 100's mg of DNS traffic seems very odd.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Nov 2017 13:36:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9296#M1219</guid>
      <dc:creator>Neil_ZInk</dc:creator>
      <dc:date>2017-11-07T13:36:44Z</dc:date>
    </item>
    <item>
      <title>Re: large amounts of DNS traffic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9297#M1220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since I know nothing about your infrastructure, it is hard for me to make accurate suggestions, but if you are concerned with your DNS traffic and would like to have more visibility into it, you may consider one of the following options:&lt;/P&gt;&lt;P&gt;1. Enable Name Resolution, if not yet enabled, for the logs to get better granular visibility in traffic-to-destination.&lt;/P&gt;&lt;P&gt;2. If your AntiBot blade is not yet enabled, please do so, as it will reduce the possibility of C&amp;amp;C traffic.&lt;/P&gt;&lt;P&gt;3. This one I &lt;STRONG&gt;cannot&lt;/STRONG&gt; recommend, as I vaguely recall reading about unexpected bad consequences of designating DCs as Internal DNS Servers, but the option is there and I would welcome the input from Check Point and community as to its current state:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="DNS Malware trap" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/60830_2017-11-07 08_58_05-SmartConsole (192.168.7.30).png" style="width: 620px; height: 473px;" /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another thing you may consider doing is subscribing to&amp;nbsp;a third-party DNS filtering service, such as OpenDNS and designating their servers for your upstream lookups.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Nov 2017 14:13:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9297#M1220</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-11-07T14:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: large amounts of DNS traffic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9298#M1221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;just make sure that&amp;nbsp;DNS traffic is not generated by R80.10 itself &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Smartlog might do that, trying to resolve all IPs in the logs&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Nov 2017 14:57:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9298#M1221</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2017-11-07T14:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: large amounts of DNS traffic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9299#M1222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Issue resolved. &amp;nbsp; PEP tables where corrupt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ran command: &amp;nbsp;#&amp;nbsp;fw tab -t pep_networks_to_pdp_db -t pep_net_reg -t pep_reported_network_masks_db -x -y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;before running the command we were seeing 2 million DNS records an hour (below)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks everyone for your responses.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60893_pastedImage_1.png" style="width: 620px; height: 151px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Nov 2017 14:14:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/9299#M1222</guid>
      <dc:creator>Neil_ZInk</dc:creator>
      <dc:date>2017-11-13T14:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: large amounts of DNS traffic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/194198#M32499</link>
      <description>&lt;P&gt;What is the correlation between pep and dns queries?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 00:02:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/large-amounts-of-DNS-traffic/m-p/194198#M32499</guid>
      <dc:creator>Kirupa_Shankar_</dc:creator>
      <dc:date>2023-10-04T00:02:59Z</dc:date>
    </item>
  </channel>
</rss>

