Skip to content

Commit d2571e6

Browse files
committed
docs: fix metadata, style edits
1 parent 56c18c8 commit d2571e6

1 file changed

Lines changed: 9 additions & 10 deletions

File tree

articles/firewall/dns-details.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,11 @@
11
---
22
title: Azure Firewall DNS Proxy details
3-
description: Learn how Azure Firewall DNS Proxy works
4-
services: firewall
3+
description: Learn about Azure Firewall DNS proxy implementation details, including FQDN caching behavior, TTL handling, and how DNS proxy affects network rule filtering.
54
author: duongau
5+
ms.author: duau
66
ms.service: azure-firewall
77
ms.topic: concept-article
8-
ms.date: 06/11/2024
9-
ms.author: duau
8+
ms.date: 03/28/2026
109
# Customer intent: As a network administrator, I want to configure Azure Firewall as a DNS proxy, so that I can ensure consistent and reliable DNS resolution for client virtual machines in my network.
1110
---
1211

@@ -20,19 +19,19 @@ The following information describes some implementation details for Azure Firewa
2019

2120
Azure Firewall acts as a standard DNS client. If multiple A records are in the response, the firewall stores all the records in cache and offers them to the client in the response. If there’s one record per response, the firewall stores only a single record. There's no way for a client to know ahead of time if it should expect one or multiple A records in responses.
2221

23-
## FQDN Time to Live (TTL)
22+
## FQDN time to live (TTL)
2423

25-
When a FQDN TTL (time-to-live) is about to expire, records are cached and expired according to their TTLs. Pre-fetching isn't used, so the firewall doesn't do a lookup before TTL expiration to refresh the record.
24+
The firewall caches and expires records according to their TTLs. Because the firewall doesn't use prefetching, it doesn't do a lookup before TTL expiration to refresh the record.
2625

2726
## Clients not configured to use the firewall DNS proxy
2827

29-
If a client computer is configured to use a DNS server that isn't the firewall DNS proxy, the results can be unpredictable.
28+
If you configure a client computer to use a DNS server that isn't the firewall DNS proxy, the results can be unpredictable.
3029

31-
For example, assume a client workload is in US East, and uses a primary DNS server hosted in US East. Azure Firewall DNS server settings are configured for a secondary DNS server hosted in US West. The firewalls DNS server hosted in US West results in a response different than that of the client in US East.
30+
For example, assume a client workload is in US East, and uses a primary DNS server hosted in US East. Azure Firewall DNS server settings are configured for a secondary DNS server hosted in US West. The firewall's DNS server hosted in US West results in a response different from that of the client in US East.
3231

33-
This is a common scenario, and why clients should use the firewalls DNS proxy functionality. Clients should use the firewall as their resolver if you use FQDNs in Network rules. You can ensure IP address resolution consistency by clients and the firewall itself.
32+
This scenario is common, and why clients should use the firewall's DNS proxy functionality. Clients should use the firewall as their resolver if you use FQDNs in Network rules. You can ensure IP address resolution consistency by clients and the firewall itself.
3433

35-
In this example, if an FQDN is configured in Network rules, the firewall resolves the FQDN to IP1 (IP address 1) and updates the network rules to allow access to IP1. If and when the client resolves the same FQDN to IP2 because of a difference in DNS response, its connection attempt won't match the rules on the firewall and is denied.
34+
In this example, if an FQDN is configured in Network rules, the firewall resolves the FQDN to IP1 (IP address 1) and updates the network rules to allow access to IP1. If and when the client resolves the same FQDN to IP2 because of a difference in DNS response, its connection attempt doesn't match the rules on the firewall and is denied.
3635

3736
For HTTP/S FQDNs in Application rules, the firewall parses out the FQDN from the host or SNI header, resolves it, and then connects to that IP address. The destination IP address the client was trying to connect to is ignored.
3837

0 commit comments

Comments
 (0)