FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
iskandar_lie
Staff
Staff
Article Id 223110
Description This article describes how the FortiGate Static DNS filter will log the traffic respective to the action setting configured for each domain.
Scope FortiGate.
Solution

This LAB testing involves FortiGate as a Firewall where a DNS filter security profile is applied and a PC Client (windows) as a client simulator

 

Static DNS filter with domain 'test.com'

 

iskandar_lie_0-1662558771130.png

 

There are 3 (three) action-settings:

  • block:   Block DNS requests to macth the domain filter with logging.
  • allow:   Allow DNS requests to match the domain filter without logging.
  • monitor:  Allow DNS requests to match the domain filter with logging.

 

*block = redirect to block portal at GUI

 

The security profile for DNS filter:

 

iskandar_lie_1-1662558986926.png

 

Under Security profile - > 'DNS Filter' - > Log all DNS queries and responses must be disabled, so FortiGate will log only according to action setting on 'Static Domain Filter' list, any action on 'FortiGuard Category Based Filter' will not be logged.

 

iskandar_lie_2-1662559066081.png

 

Enable DNS-Server on FortiGate:

 

iskandar_lie_3-1662559087938.png

 

On client PCs – make sure DNS requests are forwarded to FortiGate interface IP (where the DNS-server is configured on FortiGate) – in this sample '192.168.11.1'.

 

iskandar_lie_4-1662559119924.png

 

Under 'Firewall Policy' - > Logging options - > enabled or disabled will not affect the logging behavior from DNSfilter – 'DNS Query'  – hence this logging will affect the 'Forward Traffic' log.

 

iskandar_lie_5-1662559146510.png

 

Complete setting view of DNS filter profile test.com

 

iskandar_lie_6-1662559174341.png

 

Performing a web browsing test from the client PC with destination:

 

  • Google.com   -- action allow
  • Detik.com      -- action block
  • Cnn.com      -- action monitor

 

iskandar_lie_7-1662559196095.png

 

Conclusion:

  • Only the domain with the 'allow' action is not logged, the others are logged.
  • On the log display: 'monitor' action message will show as
  • 'Domain was allowed because it is in the domain-filter list'

 

Related article:

Configuring a DNS filter profile