<p>Welcome to the Infoblox Community Blog. This blog features articles from our community, guest bloggers and Infoblox partners.</p> <h3>Write for us.</h3> <br /> <p>Our community blog is an excellent way to share your thoughts and reach your peers. For each accepted contribution, you will receive $150. Check out the <a href="https://community.infoblox.com/t5/Announcements/Infoblox-Contributor-Program-Description/m-p/9977#M2" target="_blank">Contributor program</a> for more details.</p> <p>Any contributions are subject to the <a href="https://community.infoblox.com/t5/Community-Suggestions/Looking-for-the-Community-Terms-and-Conditions/m-p/6349#M182">Community</a> and <a href="https://www.infoblox.com/company/legal/website-terms-and-conditions/?utm_source=blox-community&utm_campaign=community-q2&utm_medium=blox-community">Website</a> Terms and Conditions.</p>
Just a few months ago there were a lot of buzz because IETF in expedited time frame (about one year) accepted DNS over HTTPS (DoH) as a standard (RFC-8484). The discussions about that are still going on because of its controversy. My personal opinion is that DoH is good for personal privacy (if you know how to use it and…
Customized Configuration Collection * This is an API enhancement that enables the customer to script their own configuration collection. This means that unsupported devices can have change management and configuration policy audits supported. This went in specifically for a customer that wanted policy checks done on SD-WAN…
Introduction Virtualization has drastically changed the landscape of modern computing everywhere in the world today. Whether it’s about on-premise data center solutions, or companies that run their entire business in the cloud, Virtualization has become an integral part of these solutions. Today customers have plethora of…
It would seem like lately our network services infrastructure – specifically our DNS infrastructure – has been trying to send us a message. On DNS Flag Day, misconfigured or outdated DNS servers (or even misconfigured network devices) will be at risk of not resolving the public domain names they host. In the last few…
By Chris Richardson with Bob Rose In our blog, Modern IPAM as a Security Asset Part 1, we proposed the importance of triangulating data for context and quick response, reliable data and 100% visibility of network endpoints. We’d like to continue the thought by recalling the story of Sam Security and Nancy Network. Sam…
As a best practice, many security professionals consider SIEM as a storage for all possible logs which are collected from various endpoint, servers, network equipment and software. This allows for the ability to correlate different types of events and effectively identify security threats. However, it doesn’t magically…
By Chris Richardson with Bob Rose IT'S TIME TO TRIANGULATE Recently, the following question came up: “How do IPAM and core network services relate to my functional role in security?” To answer this question and tie these concepts together, a timeless “back-pocket,” easy-read security blog by Srinivas Hanabe discusses how…
Over the years, DNS, the foundation of the Internet, has suffered from bloat making it unnecessarily slow, unable to deploy new features and complex to upgrade. Workarounds that crept in over the years to accommodate ad-hoc implementations are to blame. Vendors of DNS software and big public DNS providers are going to…
In version 7.3.1 of Infoblox’s NetMRI, a new and improved topology viewer was introduced. The topology viewer is the network map of the devices that NetMRI has discovered. The new topology viewer can support more than 3000 devices on the screen up to the licensed amount of devices. The new topology viewer has the following…
It looks like you're new here. Sign in or register to get started.