Skip to content

Commit 057963e

Browse files
committed
Add Azure Firewall DNAT rules documentation with FQDN filtering
1 parent 5474bb4 commit 057963e

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

articles/firewall/dnat-rule.md renamed to articles/firewall/destination-nat-rules.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,6 @@ Azure Firewall supports *FQDN filtering* in DNAT rules, allowing you to specify
4444

4545
1. In the **Add a rule collection** pane, provide the following information:
4646

47-
:::image type="content" source="./media/dnat-rule/add-rule-collection-fqdn.png" alt-text="Screenshot showing a DNAT rule created in a rule collection using an FQDN for the translated address.":::
48-
4947
- **Name**: Enter a name for the DNAT rule collection.
5048
- **Priority**: Specify a priority for the rule collection. Lower numbers indicate higher priority. The range is 100-65000.
5149
- **Action**: Destination Network Address Translation (DNAT) (default).
@@ -81,7 +79,7 @@ It's important to note the following when you're analyzing the **AZFWNatRule** l
8179
- **Private DNS zones**: Supported only within virtual networks (VNets). This feature isn't available for virtual WAN SKUs.
8280
- **Multiple IPs in DNS resolution**: If an FQDN resolves to multiple IP addresses in a private DNS zone or custom DNS servers, Azure Firewall's DNS proxy selects the first IP address from the list. This behavior is by design.
8381
- **FQDN resolution failures**:
84-
- If Azure Firewall can't resolve an FQDN, the DNAT rule doesn't get match, so the traffic isn't processed.
82+
- If Azure Firewall can't resolve an FQDN, the DNAT rule doesn't match, so the traffic isn't processed.
8583
- These failures are logged in **AZFWInternalFQDNResolutionFailure** logs only if DNS proxy is enabled.
8684
- Without DNS proxy enabled, resolution failures aren't logged.
8785

0 commit comments

Comments
 (0)