<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Requests from internal company DNS to Root-servers.net in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/requests-from-internal-company-dns-to-root-servers-net/m-p/1247995#M125988</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/142163987"&gt;@R.Colella615280&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is your internal DNS set to forward all queries to the provider DNS? If so, then Id imagine you shouldn't see so many requests contacting root servers directly from your internal... I would verify how DNS is setup internally in your environment (review forwarders/conditional forwarding/recursion). If your DNS servers are performing recursive lookups themselves, then querying root servers is typical.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What to do with the traffic you see directly to root servers depends entirely on your orgs intended DNS design. If the intent was the environment should only use provider DNS, then root queries should not occur at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As far as how to handle DNS, from a high-level:&lt;/P&gt;
&lt;P&gt;- only specify your internal DNS servers as a source&lt;/P&gt;
&lt;P&gt;- destination is set to only approved upstream DNS servers or Root servers&lt;/P&gt;
&lt;P&gt;- Block all other outbound DNS from internal networks&lt;/P&gt;
&lt;P&gt;- specify the dns app and service being app-default&lt;/P&gt;
&lt;P&gt;- Attach an anti-spyware profile w/ DNS Security enabled to inspect and protect DNS traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps!&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 12 Feb 2026 04:18:37 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2026-02-12T04:18:37Z</dc:date>
    <item>
      <title>Requests from internal company DNS to Root-servers.net</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/requests-from-internal-company-dns-to-root-servers-net/m-p/1247972#M125987</link>
      <description>&lt;P&gt;Hi, i'm observing in the fw logs massive requests from company dns servers to root servers (53 udp).&lt;BR /&gt;These servers are generally named *.root-servers.net.&lt;BR /&gt;I know that our Dns are configured to interrogate our provider DNS.&lt;BR /&gt;&lt;BR /&gt;Do i need to allow communication to root servers? &lt;BR /&gt;How to securely address the policy rule as i cannot allow all dns query (to avoid dns spoofing)?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 20:21:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/requests-from-internal-company-dns-to-root-servers-net/m-p/1247972#M125987</guid>
      <dc:creator>R.Colella615280</dc:creator>
      <dc:date>2026-02-11T20:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: Requests from internal company DNS to Root-servers.net</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/requests-from-internal-company-dns-to-root-servers-net/m-p/1247995#M125988</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/142163987"&gt;@R.Colella615280&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is your internal DNS set to forward all queries to the provider DNS? If so, then Id imagine you shouldn't see so many requests contacting root servers directly from your internal... I would verify how DNS is setup internally in your environment (review forwarders/conditional forwarding/recursion). If your DNS servers are performing recursive lookups themselves, then querying root servers is typical.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What to do with the traffic you see directly to root servers depends entirely on your orgs intended DNS design. If the intent was the environment should only use provider DNS, then root queries should not occur at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As far as how to handle DNS, from a high-level:&lt;/P&gt;
&lt;P&gt;- only specify your internal DNS servers as a source&lt;/P&gt;
&lt;P&gt;- destination is set to only approved upstream DNS servers or Root servers&lt;/P&gt;
&lt;P&gt;- Block all other outbound DNS from internal networks&lt;/P&gt;
&lt;P&gt;- specify the dns app and service being app-default&lt;/P&gt;
&lt;P&gt;- Attach an anti-spyware profile w/ DNS Security enabled to inspect and protect DNS traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 04:18:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/requests-from-internal-company-dns-to-root-servers-net/m-p/1247995#M125988</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2026-02-12T04:18:37Z</dc:date>
    </item>
    <item>
      <title>Re: Requests from internal company DNS to Root-servers.net</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/requests-from-internal-company-dns-to-root-servers-net/m-p/1248604#M126020</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;While I'm sure there is a reason you are using root servers for external DNS. You might want to watch this 12 min video.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=ROIAYSEbTuo" target="_blank"&gt;https://www.youtube.com/watch?v=ROIAYSEbTuo&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 18:53:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/requests-from-internal-company-dns-to-root-servers-net/m-p/1248604#M126020</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2026-02-19T18:53:48Z</dc:date>
    </item>
  </channel>
</rss>

