NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
config system dns-database
edit " corp_forward"
set authoritative disable
config dns-entry
edit 1
set hostname " test.example.local"
set status enable
set ttl 0
set type A
set ip 192.168.17.234
next
end
set domain " example.local"
set forwarder " 192.168.17.224"
set source-ip 0.0.0.0
set status enable
set ttl 86400
set type master
set view shadow
unset allow-transfer
set contact " hostmaster"
set primary-name " dns"
next
edit " corp_reverse"
set authoritative disable
config dns-entry
edit 1
set hostname " test.example.local."
set status enable
set ttl 0
set type PTR
set ip 192.168.17.234
next
end
set domain " 17.168.192.in-addr.arpa"
set forwarder " 192.168.17.224"
set source-ip 0.0.0.0
set status enable
set ttl 86400
set type master
set view shadow
unset allow-transfer
set contact " hostmaster"
set primary-name " dns"
next
end
Is there a way to block the resolution of DNS records of some zones in local DNS Database for recursive DNS servers running on specific interfaces?
For example, I have local zone on FortiGate which forwards lookups of internal corporate domain to internal DNS servers (As in your example.local example). I have wifi guests on isolated subnet using their local interface on fortigate as recursive DNS server. But I don't want them to be able to resolve internal corporate domain (security reasons). I want them to be able to resolve only some of the other zones I set up on the FortiGate and of course to resolve all public DNS records on the Internet.
| User | Count |
|---|---|
| 2677 | |
| 1412 | |
| 810 | |
| 703 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.