- CheckMates
- :
- Products
- :
- Quantum
- :
- Threat Prevention
- :
- Malware DNS trap with firewall's management IP
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Malware DNS trap with firewall's management IP
Hi,
I have a customer with a problem that's been occurring both with their old R80.40 firewall and even since we upgraded to R81.
Every once in a while they get hours where policy cannot be installed with "TCP Connectivity Failure on port 18191" (error no, 10) and I have confirmed that the CPD connection is being dropped due to Malware DNS Trap.
They have set the Malware DNS Trap IP to the inside IP of their firewall, which is also the interface for management.
I've changed it, but of course I now have to wait until the connectivity is unblocked, to push the change!!
Please could CP ensure that inbound control connections don't get blocked in future versions?
Thanks
Jamie
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
According to sk176926:
To resolve the problem, remove the Security gateway's IP address from the DNS trap setting and leave it as blank.
Note: The default value for DNS trap IP address is 62.0.58.94.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yeah don't set the Malware Trap IP to an actual interface of the firewall. Surprised doing so didn't get you into a LOT more trouble there. There should either be a note on that configuration screen warning not to do that, or doing so should be blocked in the GUI.
CET (Europe) Timezone Course Scheduled for July 1-2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
According to sk176926:
To resolve the problem, remove the Security gateway's IP address from the DNS trap setting and leave it as blank.
Note: The default value for DNS trap IP address is 62.0.58.94.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yeah don't set the Malware Trap IP to an actual interface of the firewall. Surprised doing so didn't get you into a LOT more trouble there. There should either be a note on that configuration screen warning not to do that, or doing so should be blocked in the GUI.
CET (Europe) Timezone Course Scheduled for July 1-2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks both. This was a previous incumbent provider who did this!
Fortunately I eventually managed to get a CPD connection "under the radar" of Malware DNS to push the corrected setting.
But yes, either some warning on the GUI, or automatic exclusion of CPD traffic addressed to the module, would be great!
Cheers
Jamie
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Would be great - but if every possible misconfiguration would trigger a warning, specialists would die of hunger 😉 The more granular the more complicated !
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for the feedback, note the current documentation is clear on this issue:
The Malware DNS trap works by configuring the Security Gateway to return a false (bogus) IP address for known malicious hosts and domains. You can use the Security Gateway external IP address as the DNS trap address but:
Do not use a gateway address that leads to the internal network.
Do not use the gateway internal management address.
If the gateway external IP address is also the management address, select a different address for the DNS trap.
