Description | This article describes an analysis of cases where DNS communication fails randomly. |
Scope | FortiGate. |
Solution |
Wireshark : 3766 2005-01-01 00:00:19.000000000 10.10.110.148 8.8.4.4 DNS 69 Standard query 0x0c68 A naver.com
Normal example: IPS debug outputs:
[1175@35316118]ips_run_session_verdict_check: serial=145418974 session is ACTIVE<----------- [1175@35316118]ips_dsct_session_loop: serial=145418974 only: dns_udp [1175@35316118]dns_dissector: Operation Code: 0 flags 0x8180 [1175@35316118]dissect_query_records: dns request: name naver.com, type 28, class 0x1, size 11 [1175@35316118]dissect_answer_records: dns reply: name naver.com, type 6, class 0x1, size 2
Abnormal example: IPS debug outputs:
[1175@-1]ips_run_session_verdict_check: can't find session <-- [1175@-1]ips_create_session: enter [1175@-1]ips_create_session: set ignore_app_after_size from 204800 to 20480 by dependencies of 0 Root [1175@-1]ips_create_session: copying ctags for session 35316118 (view 58) [1175@-1]ips_tag_cset_on_new_session: (view 58) sess_id=35316118 ctags updated
See the below commands for the IPS debug command:
diag debug console timestamp enable
FortiGate Anomaly log:
Here, the destination, 40.40.40.40, is the public IP.
Solution: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.