If I have a FQDN "abc.com" that have two DNS records 10.0.0.1 and 10.0.0.2.
Then I create a address object with FQDN type, and the value is "abc.com"
When I use this object into security policy, how does it working? Does it become 10.0.0.1 or 10.0.0.2 ? or it will randomize according to catch?
If a client connect to "abc.com", and the client's DNS (Ex. F5 GTM) resolve this FQDN become 10.0.0.1.
but in the security policy, the PaloAlto Firewall says "abc.com" is 10.0.0.2.
I think that would be a problem because sometimes it can match the rule and sometimes doesn't.
My purpose is if I use address object with FQDN then PaloAlto Firewall can resolve all about this FQDN's IP address, and apply to rule dynamically.
If the address object with FQDN always just can resolve one IP address, I think It should not be use. doesn't it?
Solved! Go to Solution.
We can resolve upto 10 IPs per FQDN and keep in security policy. Make sure your DNS server resolve FQDN to all IP addresses, than and than its possible.
Refer following thread for more details.
Do you see the IP address for which it is not working in the running security policy ? You can verify that through CLI:
show running security-policy | match 10.0.0.1
show running security-policy | match 10.0.0.2
The definitive answer depends on what the DNS query responds and if the servers themselves change their IP (or there is more than one server always-listening and DNS is being used as a load-balancing technique).
I've experienced a scenario where a FQDN was being used in a security policy, and the destination host was changing its IP address to a pool of 3 IP addresses in a round-robin fashion. The DNS record was also dynamically updated to reflect the newly assigned IP on its non-authoritative section.
The Palo Alto Networks firewall does not run a DNS resolution on the fly for every SYN packet that goes out if a FQDN is used in a security policy, thus causing a practical problem. As you described " sometimes it can match the rule and sometimes doesn't."
There is a set frequency in which the firewall will resolve a FQDN and run a short commit to update the resulting security policy. The firewall is matching IP addresses and if a FQDN is used in the security policy, it will not work well with frequently changing records.
For cloud FQDN's there are different approaches.
The DNS records may rotate pointing to new IP's (like Facebook does):
computer$ nslookup www.facebook.com
www.facebook.com canonical name = star.c10r.facebook.com.
Or another approach is to give you a long list of possible addresses (like Google does):
computer$ nslookup www.google.com
... When you have a long list of possible IP's, the Palo Alto Networks firewall will cache up to 10 IP addresses presented in the Non-authoritative section of the DNS query response. This does not mean that it will cache those IP's for a round-robin rotating DNS record.
Hope this helps,
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!