<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fingerprint or solution for detecting external DNS activity in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/fingerprint-or-solution-for-detecting-external-dns-activity/m-p/86773#M9342</link>
    <description>&lt;P&gt;Hello Peter,&lt;/P&gt;&lt;P&gt;the easiest way is the following:&lt;BR /&gt;Find a flow to the internal DNS server in the "Application Flows" tab, right-click on the flow and select "Add Fingerprint".&lt;/P&gt;&lt;P&gt;Now you have an entry consisting of port and IP. Give it a name. It is important that the "Confidence" is higher than the existing fingerprints for DNS (so your fingerprint is more specific). &amp;nbsp;You can check this in the tab "Fingerprints".&lt;/P&gt;&lt;P&gt;=&amp;gt; Requests to the internal DNS will be recognized with your new fingerprint.&lt;BR /&gt;=&amp;gt; All other DNS requests with the default fingerprint.&lt;/P&gt;</description>
    <pubDate>Fri, 09 Apr 2021 14:51:50 GMT</pubDate>
    <dc:creator>StephanH</dc:creator>
    <dc:date>2021-04-09T14:51:50Z</dc:date>
    <item>
      <title>Fingerprint or solution for detecting external DNS activity</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/fingerprint-or-solution-for-detecting-external-dns-activity/m-p/86772#M9341</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;&lt;P&gt;i am trying to find the best solution how to detect a clients, who are using external DNS in the network.&lt;/P&gt;&lt;P&gt;3rd party switches and mirror to&amp;nbsp;PV FC 180, then Extreme Analytics. My DNS servers are in subnet 10.25.0.0/16 and i need to know both - Clients who are using my and Client who are using Extrenal, then create Alarm….&lt;/P&gt;&lt;P&gt;What type of fingeprint do you recommend me?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks!&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;peter&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 04:07:23 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/fingerprint-or-solution-for-detecting-external-dns-activity/m-p/86772#M9341</guid>
      <dc:creator>Peter_Majercak</dc:creator>
      <dc:date>2021-04-09T04:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: Fingerprint or solution for detecting external DNS activity</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/fingerprint-or-solution-for-detecting-external-dns-activity/m-p/86773#M9342</link>
      <description>&lt;P&gt;Hello Peter,&lt;/P&gt;&lt;P&gt;the easiest way is the following:&lt;BR /&gt;Find a flow to the internal DNS server in the "Application Flows" tab, right-click on the flow and select "Add Fingerprint".&lt;/P&gt;&lt;P&gt;Now you have an entry consisting of port and IP. Give it a name. It is important that the "Confidence" is higher than the existing fingerprints for DNS (so your fingerprint is more specific). &amp;nbsp;You can check this in the tab "Fingerprints".&lt;/P&gt;&lt;P&gt;=&amp;gt; Requests to the internal DNS will be recognized with your new fingerprint.&lt;BR /&gt;=&amp;gt; All other DNS requests with the default fingerprint.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 14:51:50 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/fingerprint-or-solution-for-detecting-external-dns-activity/m-p/86773#M9342</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2021-04-09T14:51:50Z</dc:date>
    </item>
  </channel>
</rss>

