Created on
04-26-2023
12:32 AM
Edited on
03-20-2025
06:14 AM
By
Stephen_G
Description | This article explains FortiGate's ability to inspect and update the kernel with passing DNS queries’ responses for local FQDN address objects. |
Scope | FortiOS. |
Solution |
Background:
Observations and notes:
firewall fqdn list-ip List all IP FQDN: fqdn_u 0x105b0b86 fortinet.com.evelab.com: type:(1) ID(54) count(1) generation(16) data_len:13 flag: 1 ip list: (1 ip in total) ip: 89.31.143.1 <- Total ip fqdn range blocks: 1. Total ip fqdn addresses: 1.
firewall fqdn list-ip fqdn_u 0x105b8d96 fortinet.com.evelab.com: type:(1) ID(54) count(2) generation(17) data_len:26 flag: 1 ip list: (1 ip in total) ip: 89.31.143.1 <- ip list: (1 ip in total) ip: 10.10.10.10 <- Total ip fqdn range blocks: 2. Total ip fqdn addresses: 2.
Solution: There are two workarounds to change this behavior as shown below:
config system network-visibility set destination-visibility disable
config system session-helper delete 14 end
Note: The dnsproxy service must be restarted after making the above changes, and if FortiGate units are deployed in a HA cluster, the dnsproxy service must be restarted in all HA members at about the same time to prevent one of the secondary updating the primary FQDN list with the undesired IP. Without restarting the dnsproxy the undesired entry will stay until DNS TTL expires.
diagnose test application dnsproxy 99
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.