Skip to content

Commit 38fd06e

Browse files
Merge pull request #295695 from aralvar/patch-5
NIC NSGs also bypass 53 traffic
2 parents 8c9cbcd + 45ef38d commit 38fd06e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -301,7 +301,7 @@ If you provide your own DNS solution, it needs to:
301301
302302
For best performance, when you use Azure VMs as DNS servers, IPv6 should be disabled.
303303
304-
Network security groups (NSGs) act as firewalls for your DNS resolver endpoints. Modify or override your NSG security rules to allow access for UDP Port 53 (and optionally, TCP Port 53) to your DNS listener endpoints. After custom DNS servers are set on a network, the traffic through port 53 bypasses the NSGs of the subnet.
304+
Network security groups (NSGs) act as firewalls for your DNS resolver endpoints. Modify or override your NSG security rules to allow access for UDP Port 53 (and optionally, TCP Port 53) to your DNS listener endpoints. After custom DNS servers are set on a network, the traffic through port 53 bypasses the NSGs of the subnet and the NIC.
305305
306306
> [!IMPORTANT]
307307
> If you use Windows DNS servers as custom DNS servers forwarding DNS requests to Azure DNS servers, make sure you increase the Forwarding Timeout value more than four seconds to allow Azure recursive DNS servers to perform proper recursion operations.

0 commit comments

Comments
 (0)