Skip to content

Commit a26412d

Browse files
authored
Merge pull request #191453 from hallihan/azure-docs-issues-23574
Add note on custom DNS setting
2 parents 91f8f6a + 91e2cd9 commit a26412d

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: virtual-network
99
ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: infrastructure-services
12-
ms.date: 3/2/2020
12+
ms.date: 3/11/2022
1313
ms.author: rohink
1414
ms.custom: fasttrack-edit
1515
---
@@ -182,7 +182,8 @@ If forwarding queries to Azure doesn't suit your needs, you should provide your
182182
* Be secured against access from the internet, to mitigate threats posed by external agents.
183183

184184
> [!NOTE]
185-
> For best performance, when you are using Azure VMs as DNS servers, IPv6 should be disabled.
185+
> * For best performance, when you are using Azure VMs as DNS servers, IPv6 should be disabled.
186+
> * NSGs act as firewalls for you DNS resolver endpoints. You should modify or override your NSG security rules to allow access for UDP Port 53 (and optionally TCP Port 53) to your DNS listener endpoints. Once custom DNS servers are set on a network, then the traffic through port 53 will bypass the NSG's of the subnet.
186187
187188
### Web apps
188189
Suppose you need to perform name resolution from your web app built by using App Service, linked to a virtual network, to VMs in the same virtual network. In addition to setting up a custom DNS server that has a DNS forwarder that forwards queries to Azure (virtual IP 168.63.129.16), perform the following steps:

0 commit comments

Comments
 (0)