Apply FQDN address groups within the ISDB
Fully Qualified Domain Name (FQDN) address groups can be applied within the Internet Service Database (ISDB), addressing the challenge of frequently changing IP addresses and ensuring accurate and reliable firewall policies. Predefined, built-in FQDN address groups are available as custom Internet services and can be applied to various firewall policies using the internet-service-custom command.
The following diagnose commands identify predefined FQDNs:
# diagnose ffdb-fqdn custom-list [<Predefined Internet service name>] # diagnose ffdb-fqdn custom-get <Predefined FQDN name>
|
Command |
Description |
|---|---|
|
ffdb-fqdn custom-list |
List which specific FQDNs are included in a built-in FQDN entry. If the custom name of the predefined Internet service is appended to the end of the command, only that entry's information is displayed. If a custom name is not defined, all entries in the current database will be listed. |
|
ffdb-fqdn custom-get |
Determine which built-in FQDN entry the given FQDN name belongs to. |
To list built-in FQDNs included in an FQDN entry:
# diagnose ffdb-fqdn custom-list g-BuiltIn-Microsoft-Microsoft.Update Version: 00007.03913 Timestamp: 202410251745 Format: 1 MD5SUM: f6091dd5132f25bec4294442918e0c35 List BuiltIn FQDNs for g-BuiltIn-Microsoft-Microsoft.Update: *.dsp.mp.microsoft.com; *.windowsupdate.com; windowsupdate.microsoft.com; *.update.microsoft.com; *.download.microsoft.com; wustat.windows.com; ntservicepack.microsoft.com; *.delivery.mp.microsoft.com; devicelistenerprod.microsoft.com;
To determine which entry a given FQDN is included in:
# diagnose ffdb-fqdn custom-get windowsupdate.microsoft.com Version: 00007.03913 Timestamp: 202410251745 Format: 1 MD5SUM: f6091dd5132f25bec4294442918e0c35 Get BuiltIn Custom Name for windowsupdate.microsoft.com: g-BuiltIn-Microsoft-Microsoft.Update
Example
In the following example, a predefined FQDN Internet service, g-BuiltIn-Microsoft-Microsoft.Update, is applied to a firewall policy. We will then review how the customer Internet service is loaded in the kernel and try to send packet sot the FortiGate from the client to hit the policy. Finally, we will review the Internet service related fields in the traffic logs.
To apply FQDN address groups within the ISDB:
-
Apply the built-in FQDN entry to the firewall policy:
config firewall policy edit 1 set name "isdb-policy" set srcintf "port2" set dstintf "port1" set action accept set srcaddr "all" set internet-service enable set internet-service-custom "g-BuiltIn-Microsoft-Microsoft.Update" set schedule "always" set logtraffic all set auto-asic-offload disable set nat enable next end -
Review how the FQDN entry is loaded into the kernel:
# diagnose firewall iprope list 100004 | grep -A 16 index=1 policy index=1 uuid_idx=8207 action=accept flag (8050109): log redir nat master use_src pol_stats flag2 (6200): no_asic log_fail resolve_sso flag3 (a0): link-local best-route flag4 (200): port-preserve schedule(always) cos_fwd=255 cos_rev=255 group=00100004 av=00004e20 au=00000000 split=00000000 host=0 chk_client_info=0x0 app_list=0 ips_view=0 misc=0 zone(1): 8 -> zone(1): 7 source(1): 0.0.0.0-255.255.255.255, uuid_idx=8050, dest(1): 0.0.0.0-255.255.255.255, uuid_idx=8050, service(1): [0:0x0:0/(0,65535)->(0,65535)] flags:0 helper:auto internet service(1): g-BuiltIn-Microsoft-Microsoft.Update(4278190087,0,0,0) -
Review the FQDN domain name and corresponding IP address information contained in the built-in FQDN entry are listed. The resolution of these domain names comes from the DNS server set by the FortiGate.
# diagnose firewall internet-service-custom list List internet service in kernel(custom): name=g-BuiltIn-Microsoft-Microsoft.Update id=4278190087 reputation=3 Unverified site. singularity=0 flags=0x0 protocol=0 fqdn=(9): devicelistenerprod.microsoft.com ID(26) ADDR(172.179.72.126) *.download.microsoft.com ID(42) *.update.microsoft.com ID(79) *.dsp.mp.microsoft.com ID(83) ntservicepack.microsoft.com ID(147) ADDR(20.72.235.82) windowsupdate.microsoft.com ID(210) ADDR(20.72.235.82) wustat.windows.com ID(216) *.windowsupdate.com ID(241) *.delivery.mp.microsoft.com ID(339) -
Send packets from the client to the FQDN domain
windowsupdate.microsoft.com, which is one of the FQDN domains included ing-BuiltIn-Microsoft-Microsoft.Update. The traffic will hit and be forwarded by the firewall policy.1: date=2024-10-16 time=12:30:24 eventtime=1729107023938309279 tz="-0700" logid="0000000013" type="traffic" subtype="forward" level="notice" vd="root" srcip=10.1.100.41 srcport=46900 srcintf="port2" srcintfrole="undefined" dstip=20.72.235.82 dstport=443 dstintf="port1" dstintfrole="undefined" srcuuid="5cfbeb4e-b05e-51ee-233c-5026f6bf6d00" srccountry="Reserved" dstcountry="United States" dstreputation=3 sessionid=1243 proto=6 action="close" policyid=1 policytype="policy" poluuid="ea3d8560-ea62-51ee-fa88-20dfc247a38c" policyname="isdb-policy" dstinetsvc=" g-BuiltIn-Microsoft-Microsoft.Update" service=" g-BuiltIn-Microsoft-Microsoft.Update" trandisp="snat" transip=172.16.200.6 transport=46900 appcat="unscanned" duration=2 sentbyte=1623 rcvdbyte=5268m sentpkt=16 rcvdpkt=13