If im not mistaken FQDN rules are resolved when the ruleset is committed and not dynamically. Also note that the ruleset can be automatically committed if you have "download-and-apply" threat preventation and/or url-category database updates (usually once or twice a day). Generelly its bad to use FQDN for firewalls mainly because you will then rely on some external information. Let us assume you setup a rule which looks like: srcip: any srcport: >1023 dstip: mail.example.com dstport: any And then let us assume someone dns poision the dns-server your firewall is using when committing the rules so mail.example.com resolves into "0.0.0.0" (or even worse hacks your dns-server to manually setup the zones). Or for that matter if the dns-server is unavailable when you commits the ruleset - is the default in the firewall "0.0.0.0" for unresolved addresses or is it "255.255.255.255" (or will it even commit)? The result would then be that you allow the current port and/or app-id to EVERY ip-address available for that particular zone (or even worse if you select zone:any). If you want to setup rules towards your email servers we can be pretty sure you already use static ip's for those servers and therefor your have another reason for why you shouldnt use FQDN (because there is simply no need to). You can setup local names in the firewall if you go to Network -> Address objects (and even Address Groups) to setup stuff like: Address objects: mail1.example.com (1.1.1.1) mail2.example.com (2.2.2.2) Address group: Mailservers (mail1.example.com, mail2.example.com) The above will point to the address objects named mail1. and mail2. NOT the FQDN). Or if you think you could be confused if its FQDN or not then just: Address objects: mail1 (1.1.1.1) mail2 (2.2.2.2) Address group: Mailservers (mail1, mail2) and then setup the rule as (just an example, in real life one would choose designated port along with zone AND app-id etc): srcip: any srcport: >1023 dstip: Mailservers dstport: any
... View more