Skip to content

Commit 427e0f6

Browse files
committed
freshness review - March 2025
1 parent 8418ab2 commit 427e0f6

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/firewall/fqdn-filtering-network-rules.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,32 +5,32 @@ services: firewall
55
author: duongau
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 05/10/2024
8+
ms.date: 03/17/20255
99
ms.author: duau
1010
ms.custom: engagement-fy23
1111
---
1212

1313
# Use FQDN filtering in network rules
1414

15-
A fully qualified domain name (FQDN) represents a domain name of a host or one or more IP addresses. You can use FQDNs in network rules based on DNS resolution in Azure Firewall and Firewall policy. This capability allows you to filter outbound traffic with any TCP/UDP protocol (including NTP, SSH, RDP, and more). You must enable DNS Proxy to use FQDNs in your network rules. For more information, see [Azure Firewall DNS settings](dns-settings.md).
15+
A fully qualified domain name (FQDN) represents the complete domain name of a host or one or more IP addresses. In Azure Firewall and Firewall policy, you can use FQDNs in network rules based on DNS resolution. This feature allows you to filter outbound traffic using any TCP/UDP protocol, including NTP, SSH, and RDP. To use FQDNs in your network rules, you must enable DNS Proxy. For more information, see [Azure Firewall DNS settings](dns-settings.md).
1616

1717
> [!NOTE]
18-
> By design, FQDN filtering in network rules doesnt support wildcards
18+
> FQDN filtering in network rules doesn't support wildcards by design.
1919
2020
## How it works
2121

22-
Once you define which DNS server your organization needs (Azure DNS or your own custom DNS), Azure Firewall translates the FQDN to an IP address or addresses based on the selected DNS server. This translation happens for both application and network rule processing.
22+
First, define the DNS server your organization uses (either Azure DNS or a custom DNS). Azure Firewall then translates the FQDN to an IP address or addresses based on the chosen DNS server. This translation applies to both application and network rule processing.
2323

24-
When a new DNS resolution takes place, new IP addresses are added to firewall rules. Old IP addresses expire in 15 minutes when the DNS server no longer returns them. Azure Firewall rules are updated every 15 seconds from DNS resolution of the FQDNs in network rules.
24+
When a new DNS resolution occurs, new IP addresses are added to the firewall rules. Old IP addresses expire after 15 minutes if the DNS server no longer returns them. Azure Firewall updates its rules every 15 seconds based on the DNS resolution of the FQDNs in network rules.
2525

26-
### Differences in application rules vs. network rules
26+
### Differences between application rules and network rules
2727

28-
- FQDN filtering in application rules for HTTP/S and MSSQL is based on an application level transparent proxy and the SNI header. As such, it can discern between two FQDNs that are resolved to the same IP address. This isn't the case with FQDN filtering in network rules.
28+
- FQDN filtering in application rules for HTTP/S and MSSQL relies on an application-level transparent proxy and the SNI header. This allows it to differentiate between two FQDNs that resolve to the same IP address. This capability isn't available with FQDN filtering in network rules.
2929

30-
Always use application rules when possible:
31-
- If the protocol is HTTP/S or MSSQL, use application rules for FQDN filtering.
30+
Always use application rules when possible:
31+
- For HTTP/S or MSSQL protocols, use application rules for FQDN filtering.
3232
- For services like AzureBackup and HDInsight, use application rules with FQDN tags.
33-
- For any other protocols, you can use network rules for FQDN filtering.
33+
- For other protocols, use network rules for FQDN filtering.
3434

3535
## Next steps
3636

0 commit comments

Comments
 (0)