DNS, DHCP & IP Address Management appliances
For Microsoft DNS & DHCP servers
For open source DNS & DHCP servers
Cloud-based visualization of analytics across DDI architecture
Manage multi-vendor cloud DNS servers centrally
RIR Declaration Management and Automation
Automated network device configuration and management
Centralized visibility over all your clouds
A single source of truth for your network automation
Why DDI is an Obvious Starting Point
DNS Threat Intelligence for proactive defense
Intelligence Insights for Threat Detection and Investigation
Adaptive DNS security for service continuity and data protection
Improve Application Access Control to prevent spread of attacks
Protect users and block DNS-based malware activity
Carrier-grade DNS DDoS attack protection
Optimize application delivery performance from the edge
for Proactive Network Security
Visibility, analytics and micro segmentation for effective Zero Trust strategy
Enable work from anywhere by controlling access, security and data privacy
Simplify management and control costs across AWS, Azure and GCP environments
Risk-free migration to reduce DDI complexity and cost
Move risk-free to improve performance, security and costs
Automate management, unify control and strengthen security of connected devices
Protect your network against all DNS attacks, data exfiltration and ransomware
Enable zero touch operations for network management and security
Improve resiliency, deployment velocity and user experience for SD-WAN projects
Integrated DNS, DHCP, IPAM services to simplify, automate and secure your network.
Simplify design, deployment and management of critical DDI services for telcos
Optimize administration and security of critical DDI services for healthcare
Simplify and automate management of critical DDI services for finance
Simplify and automate management of critical DDI services for higher education
Simplify and automate management of critical DDI services for retail
Simplify Management and Automation for Network Operations Teams
Elevate SecOps Efficiency by Simplifying Threat Response
Open architecture for DDI integration
Technology partnerships for network security & management ecosystems
Extend security perimeters and strengthen network defenses
Submit requests for temporary licenses
Submit access requests for EfficientIP knowledge platforms
Submit membership requests for EfficientIP Community
Strengthen Your Network Protection with Smart DNS Security
Customer-centric DDI project delivery and training
Acquire the skills needed to manage EfficientIP SOLIDserverâ„¢
Identify vulnerabilities with an assessment of your DNS traffic
Test your protection against data breaches via DNS
Dedicated representation for your organization inside EfficientIP
Explore content which helps manage and automate your network and cloud operations
Read content which strengthens protection of your network, apps, users and data
Learn how to enhance your app delivery performance to improve resilience and UX
Why Using DNS Allow Lists is a No-Brainer
This enterprise-grade cloud platform allows you to improve visibility, enhance operational efficiency, and optimize network performance effortlessly.
Who we are and what we do
Meet the team of leaders guiding our global growth
Technology partnerships for network security and management ecosystems
Discover the benefits of the SmartPartner global channel program
Become a part of the innovation
The latest updates, release information, and global events
May 20, 2021 | Written by: Surinder Paul | DHCP, DNS, DNS Security, IPAM
Client Query FilteringCommand and ControlCQFDDIDHCPDNSDNS ApplianceDNS FilteringDNS ManagementDNS ProtectionDNS Security IssuesDNS SolutionIoTIP Address ManagementIPAMIPAM RepositoryNetwork AutomationSOLIDserver
IoT devices are popping up every second, with many being on an organization’s network but not always under the control of I&O teams. These devices are required to be identified, inventoried, screened, managed and secured in order not to cause any problems to the rest of the IT ecosystem, the users or the organization itself. This requires tooling and processes where the DDI (DNS-DHCP-IPAM) certainly has an important role to play, in particular EfficientIP’s DNS Client Query Filtering (CQF) feature.
We are all using connected devices (generally called IoT) at home or at work. For some, even our watch or our car is an IoT device, and there’s no way to counter this trend. But as is often the case, this global innovation comes with drawbacks including security, data collection and personal life exposure. Whenever an IP device is connected to a network, at home or at the office, in the store or in the factory, data and command exchanges occur. We need to be aware of the criticality of these exchanges, which data is exposed, how it’s manipulated and how it’s stored. For IT people such as us, these are potentially all cause for concern.
Security is an important topic when dealing with IoT. Most of the time the device is selected with unique choice criteria: its functional answer to the problem or the request. Price may not be a real problem since cost per unit can seem low with regards to the proposed service. The industry is now proposing easy platforms to develop IoT and take in charge all the “computer and communication” aspects – the remaining electronic and mechanical parts are being mastered by the various manufacturers. But the cost-effectiveness of these platforms is not only related to the cost of microcontrollers, it is also mostly linked to the low quality of the embedded software, its lack of continuous improvement, testing and maintenance. This is the main reason why an IoT device can be a real threat to the network, as it simplifies its usage as an attack vector or being taken advantage of well known flaws in the integrated software.
As a conservative measure any IoT device using IP as its communication channel should be isolated from the rest of the organization network (it is a bit more complex to do this at home). Applying the Zero Trust Security approach is obvious for IoT, but not always easy to implement. These devices generally do not register on the network, do not authenticate themselves or obtain authorization from an organization component. Their standard networking process is to get access to the network through Ethernet or Wi-Fi – it can also be through a gateway system like a LoRa concentrator – then they obtain an IP address through standard DHCP, resolve the few domain names to get access to their command and control service and they are live. As a user, you see them automatically connected to the service platform and providing data from the sensors or proposing actions to perform.
At the network level, we can enforce security with a NAC system (Network Access Control), if well applied with minimum exception this is probably the best approach and it can begin with standard 802.1X solution with a fully open source, internally built platform. But this approach is complex and only affordable to big corporations or security aware/obliged companies. Since most IoT devices are not able to authenticate themselves, this may cause issues with deployment and should be specifically handled.
However, for most organization’s networks security is not enforced with NAC at the network level, even Wi-Fi access still relies on standard pre-shared key authentication. Getting an IoT component plugged onto the corporate network is easy, no need to ask for an I&O operation or support, with a good chance it will work automatically. The next level to pass is obtaining an IP address, by default the IoT will try DHCP as it is standard, omnipresent, convenient and works very well. Once an IP address and related configuration are available, the next step is to start IP communication with the central service that can be inside the organization or on a cloud platform on the Internet. For this step, DNS is the most straightforward solution, and frequently the DNS servers provided in the IP networking configuration by the DHCP are available and able to perform recursion up to the Internet.
As we can see, the DDI solution and especially the services facing the devices (DHCP and DNS) play an important role for any IoT to become online. The IPAM, when tightly coupled with both services, offers global visibility over all the devices connected to the network, the DHCP manages the IP addresses contained in the leases in the corresponding network of the IPAM and the DNS can bring visibility on the resolution through analytics. Therefore, the IPAM solution is also able to make some decisions and automate the network for improving security, this is what we call DDI automation.
With the DNS Client Query Filtering security solution (CQF), the SOLIDserver brings a new approach to network security. With its ability to apply various security policies to different groups of devices on the network it can greatly help with IoT management. Ideally, IoT requires to be separated from other kinds of devices on the network, the DNS with CQF can isolate these IoT devices into more strict policies of name resolution. To this extent, we recommend applying strict filtering based on an “allow list” (whitelist): any DNS resolution request needs to be for an explicitly known domain to be performed. Far easier to manage than deny lists (blacklists) that are never accurate or up-to-date through reputation management, the allow list is the most simple way to apply security, similar to how we have been performing IP filtering in firewalls for decades now.
By combining all DDI components into a rich automation process we can handle a first level of security for IoT. The DHCP service screens devices when attributing the IP address leases, and informs the IPAM through standard synchronization. The DDI can perform a specific automation to add the IoT device’s IP address into a specific DNS zone used as a client list of the CQF security process. Automatically, the IoT will then only be authorized to resolve names which are known to be safe for the organization’s IoT fleet.
This fully automated process proposed by the SOLIDserver solution limits attacks, exploits and bad behavior of the IoT software embedded in multiple components. With its ability to react quickly and scale up to millions of entries managed, it is capable of handling most IoT situations, even in high density networks such as smart cities, utilities and factories. And without doubt, it will also be useful in much smaller environments where IoTs are more recreational, like connected screens, weather or presence sensors and power relays.
When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.
Explore content highlighting the value EfficientIP solutions bring to your network
We use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site.