You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/dns-settings.md
+14-11Lines changed: 14 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ You can configure a custom DNS server and enable DNS proxy for Azure Firewall. C
19
19
20
20
## DNS servers
21
21
22
-
A DNS server maintains and resolves domain names to IP addresses. By default, Azure Firewall uses Azure DNS for name resolution. The **DNS server** setting lets you configure your own DNS servers for Azure Firewall name resolution. You can configure a single server or multiple servers. If you configure multiple DNS servers, the server used is chosen randomly. You can configure a maximum of 15 DNS servers in **Custom DNS**.
22
+
A DNS server maintains and resolves domain names to IP addresses. By default, Azure Firewall uses Azure DNS for name resolution. The **DNS server** setting lets you configure your own DNS servers for Azure Firewall name resolution. You can configure a single server or multiple servers. If you configure multiple DNS servers, the server used is chosen randomly. You can configure a maximum of 15 DNS servers in **Custom DNS**.
23
23
24
24
> [!NOTE]
25
25
> For instances of Azure Firewall that are managed by using Azure Firewall Manager, the DNS settings are configured in the associated Azure Firewall policy.
@@ -40,13 +40,13 @@ The following example updates Azure Firewall with custom DNS servers by using th
40
40
41
41
```azurecli-interactive
42
42
az network firewall update \
43
-
--name fwName \
43
+
--name fwName \
44
44
--resource-group fwRG \
45
45
--dns-servers 10.1.0.4 10.1.0.5
46
46
```
47
47
48
48
> [!IMPORTANT]
49
-
> The command `az network firewall` requires the Azure CLI extension `azure-firewall` to be installed. You can install it by using the command `az extension add --name azure-firewall`.
49
+
> The command `az network firewall` requires the Azure CLI extension `azure-firewall` to be installed. You can install it by using the command `az extension add --name azure-firewall`.
50
50
51
51
#### [PowerShell](#tab/powershell)
52
52
@@ -73,7 +73,7 @@ If you enable FQDN filtering in network rules but don't configure client virtual
73
73
74
74
When Azure Firewall is a DNS proxy, two caching function types are possible:
75
75
76
-
-**Positive cache**: DNS resolution is successful. The firewall caches these responses according to the TTL (time to live) in the response up to a maximum of 1 hour.
76
+
-**Positive cache**: DNS resolution is successful. The firewall caches these responses according to the TTL (time to live) in the response up to a maximum of 1 hour.
77
77
78
78
-**Negative cache**: DNS resolution results in no response or no resolution. The firewall caches these responses according to the TTL in the response, up to a max of 30 minutes.
79
79
@@ -91,15 +91,15 @@ DNS proxy configuration requires three steps:
91
91
1. Enable the DNS proxy in Azure Firewall DNS settings.
92
92
2. Optionally, configure your custom DNS server or use the provided default.
93
93
3. Configure the Azure Firewall private IP address as a custom DNS address in your virtual network DNS server settings to direct DNS traffic to the Azure Firewall.
94
-
94
+
95
95
> [!NOTE]
96
96
> If you use a custom DNS server, select an IP address from your virtual network that isn't part of the Azure Firewall subnet.
97
97
98
98
#### [Portal](#tab/browser)
99
99
100
100
To configure DNS proxy, you must configure your virtual network DNS servers setting to use the firewall private IP address. Then enable the DNS proxy in the Azure Firewall **DNS settings**.
101
101
102
-
##### Configure virtual network DNS servers
102
+
##### Configure virtual network DNS servers
103
103
104
104
1. Select the virtual network where the DNS traffic is routed through the Azure Firewall instance.
105
105
2. Under **Settings**, select **DNS servers**.
@@ -123,10 +123,10 @@ You can use the Azure CLI to configure DNS proxy settings in Azure Firewall. You
123
123
##### Configure virtual network DNS servers
124
124
125
125
The following example configures the virtual network to use Azure Firewall as the DNS server.
126
-
126
+
127
127
```azurecli-interactive
128
128
az network vnet update \
129
-
--name VNetName \
129
+
--name VNetName \
130
130
--resource-group VNetRG \
131
131
--dns-servers <firewall-private-IP>
132
132
```
@@ -137,7 +137,7 @@ The following example enables the DNS proxy feature in Azure Firewall.
137
137
138
138
```azurecli-interactive
139
139
az network firewall update \
140
-
--name fwName \
140
+
--name fwName \
141
141
--resource-group fwRG \
142
142
--enable-dns-proxy true
143
143
```
@@ -178,13 +178,16 @@ If all DNS servers are unavailable, there's no fallback to another DNS server.
178
178
179
179
### Health checks
180
180
181
-
DNS proxy performs five-second health check loops for as long as the upstream servers report as unhealthy. The health checks are a recursive DNS query to the root name server. Once an upstream server is considered healthy, the firewall stops health checks until the next error. When a healthy proxy returns an error, the firewall selects another DNS server in the list.
181
+
DNS proxy performs five-second health check loops for as long as the upstream servers report as unhealthy. The health checks are a recursive DNS query to the root name server. Once an upstream server is considered healthy, the firewall stops health checks until the next error. When a healthy proxy returns an error, the firewall selects another DNS server in the list.
182
182
183
183
## Azure Firewall with Azure Private DNS Zones
184
184
185
185
Azure Firewall supports integration with Azure Private DNS zones, allowing it to resolve private domain names. When you associate a Private DNS zone with the virtual network where Azure Firewall is deployed, the firewall can resolve names defined in that zone.
186
186
187
-
> [!IMPORTANT]
187
+
> [!NOTE]
188
+
> This integration applies to name resolution performed **by Azure Firewall itself** (for example, when the firewall resolves FQDNs in network rules or application rules). DNS queries from downstream clients sent to Azure Firewall’s DNS Proxy are **not** resolved using Azure Private DNS zones unless the configured upstream DNS server also has access to those zones. The DNS Proxy simply forwards client queries to its configured upstream servers and does not merge results from Azure DNS.
189
+
190
+
> [!IMPORTANT]
188
191
> Avoid creating DNS records in Private DNS zones that override Microsoft-owned default domains. Overriding these domains can prevent Azure Firewall from resolving critical endpoints, which can disrupt management traffic and cause features such as logging, monitoring, and updates to fail.
189
192
190
193
The following is a *nonexhaustive* list of Microsoft-owned domains that should **not** be overridden, as Azure Firewall management traffic might require access to them:
0 commit comments