| Description | This article discusses on how FortiGate units may periodically generate DNS queries for the root zone ('.') toward the configured system DNS servers. These queries can appear in DNS server logs as unusual or invalid and may trigger alerts or cause minor performance degradation on internal DNS resolvers. This behavior is expected and originates from the FortiGate’s internal dnsproxy process, which handles system-level DNS lookups such as FortiGuard connectivity checks and FQDN object resolution. |
| Scope | All FortiGate models and FortiOS versions, including standalone and HA deployments, when system DNS servers are defined under config system dns. |
| Solution |
This behavior is normal and does not indicate a malfunction or security issue. Options to reduce alerts or impact:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.