Description | This article describes how to handle a scenario where Google is or other websites are unexpectedly blocked from the internal DNS. |
Scope | FortiGate. |
Solution |
With certain internal DNS setups, google.com or any other website may unexpectedly be blocked for matching the FQDN address object.
FortiGate is configured with a DNS server as a primary x.x.x.x and secondary y.y.y.y, which are local DNS servers.
Intermittently, Google services are blocked by a deny policy 'ABC', where an FQDN setup is resolving to 216.239.38.120 in the destination address.
> google.com Non-authoritative answer:
Additionally, in the forward traffic logs:
date=2025-03-06 time=12:14:19 eventtime=1741252458982164771 tz="+0300" logid="0000000013" type="traffic" subtype="forward" level="notice" vd="root" srcip=10.1.161.76 srcport=57997 srcintf="DMZ-Core-SW" srcintfrole="lan" dstip=216.239.38.120 dstport=443 dstintf="Zscaler-GRE-Mob" dstintfrole="lan" srccountry="Reserved" dstcountry="United States" sessionid=1595316118 proto=17 action="deny" policyid=ABC policytype="policy" poluuid="bcf97ef2-2f81-51ee-e344-1be77fbcdab2" policyname="User-to-Zscaler-Denied-IP's" service="UDP_443" trandisp="noop" duration=0 sentbyte=0 rcvdbyte=0 sentpkt=0 rcvdpkt=0 shapingpolicyid=19 shapingpolicyname="Zscaler-10mbps" shaperperipname="All-Users-Internet-Zscaler-10MB" shaperperipdropbyte=0 vwlid=21 vwlquality="Seq_num(5 Zscaler-GRE-Mob), alive, sla(0x1), gid(2), num of pass(1), selected" vwlname="Zscaler-SDWAN-Rule" appcat="unscanned" crscore=30 craction=131072 crlevel="high" srchwvendor="Cisco" devtype="Router" mastersrcmac="f8:a7:3a:6f:1e:ef" srcmac="f8:a7:3a:6f:1e:ef" srcserver=0.
In the DNS proxy output, both domains are resolving to the same IP and matching the deny policy:
2025-03-06 12:09:39 vfid=0 name=www.google.com ver=IPv4 wait_list=0 timer=8 min_refresh=60 min_ttl=60 cache_ttl=0 slot=-1 num=2 wildcard=02025-03-06 12:09:39 2025-03-06 12:09:38 vfid=0 name=zcky.na.lb.holadns.com ver=IPv4 wait_list=0 timer=34 min_refresh=60 min_ttl=5 cache_ttl=0 slot=-1 num=2 wildcard=02025-03-06 12:09:38
get sys status
As FQDN is getting resolved to 216.239.38.120, the iprobe table created for the policy ABC contains this address in the destination, and the action is set to block.
As a workaround, create a whitelist policy for IP 216.239.38.120 and place it on top of the 'abc' policy for the important server. |