What is the latest version of Infoblox?
What is the latest version of Infoblox?
NIOS 8.5/8.5.1
NIOS 8.5/8.5. 1 is the newest version of Infoblox’s Network Identity Operating System (NIOS). By continuously investing in NIOS, Infoblox enables organizations to deploy robust, manageable and cost-effective DDI services to networks of any size today and into the future.
How do I update Infoblox Grid?
To upgrade a Grid immediately: From the Grid tab, select the Upgrade tab, and then click Upgrade -> Upgrade Now from the Toolbar.
What is Infoblox NIOS?
Network Identity Operating System (NIOS) is the operating system that powers Infoblox core network services, ensuring non-stop operation of network infrastructure.
What is infoblox used for?
Infoblox delivers appliance-based solutions for business-critical DNS, DHCP, and IP Address Management (DDI) and Network Automation. Over 7,700 global enterprises and service providers use Infoblox to control their networks. Infoblox uses actionable network intelligence to deliver control and security from the core.
What does Infoblox NIOS 8.4.8.2.2 do?
Infoblox NIOS 8.4.8 / 8.5.2 / 8.6.0. delivers advanced encrypted security and privacy for enterprises (DoT/DoH), expands multi-cloud automation and templated API integrations, and strengthens cost-effective DDI reliability for hybrid networks of any size—today and into the future.
Are there any vulnerabilities in the Infoblox product?
To eliminate any possibility of exploiting the above vulnerabilities, Infoblox strongly recommends applying the attached Hotfix that is specific to the NIOS version you are running. Hotfix Release Forms specific to NIOS version are also attached. Only one Hotfix is needed as each Hotfix contains a fix for both vulnerabilities.
What can I do with NIOS 8.4.4?
Infoblox hybrid cloud automation has been further extended through integration with Google Cloud. NIOS 8.4 lets you deploy Infoblox DDI virtual appliances in a Google VPC to provide DNS services.
Is the Infoblox NIOS vulnerable to cve-2020-8617?
On May 19, 2020, ISC announced CVE-2020-8617. This issue is a defect in TSIG handling which allows a specially malformed packet to trigger an INSIST assertion failure, causing denial of service.