Core component of SQL Server for storing, processing, and securing data
For the most part - SMB over QUIC on Windows Server 2022 uses TLS 1.3 encryption. It is not just “UDP 443”; it is a fully encrypted, authenticated transport similar in security to HTTPS/HTTP-3. QUIC provides its own reliability, congestion control and encryption, so the connection is actually more secure than traditional SMB over TCP 445 and does not rely on TLS/SSL (SSL is an outdated term) at all.
For firewall requirements, the port rule must be opened between the actual SQL Server hosts, not between the cluster virtual IPs. Log shipping copies files between servers using UNC paths, and SMB/QUIC operates at the host level. Effectively, UDP 443 must be allowed from the primary SQL Server node to the DR SQL Server node (and vice-versa if needed), and for all nodes that might participate in failover scenarios. The VIP does not carry SMB traffic, so no firewall changes are required for it.
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.
hth
Marcin