Hi Jeff,
Your CONFIG1 has some drawbacks, and I am confident we can get something similar to CONFIG2 to work.
I see you are using the DNS role on Windows Server. Instead of doing it the way you have in the screen shot above (CONFIG1), do it this way instead:
- Go to DNS Manager
-
- Right-click on your server name and go to Properties
-
- Go to the Forwarders tab
- Click Edit and add Azure's DNS to it: 168.63.129.16
-
Finally, remove the Azure Files domain from your Forward Lookup Zone.
What this is doing is telling your DNS that anytime it receives a DNS query that it doesn't know how to resolve (not in any of your Foward Lookup Zone), send it off to Azure DNS to figure it out.
This way, you are not having your DNS server resolving Azure FQDNs which is hard to manage and may not be the behavior you want as you continue to add more resources to your environment. With CONFIG1, what would happen if you added a second Azure File share with its own private endpoint that has a different private IP than this one?
This will also cover you for future private endpoints on other Azure services.
Which VNET in your screenshot is the pair of DNS Servers residing in?
Do you have both of their IP address set in each of the VNET's?
Like this for me but use your own DNS Server IP addresses:
As for your P2S VPN clients, you will need to push a modified azurevpnconfig_xxx.xml file with this content:
Where x.x.x.x, and y.y.y.y would be your pair of DNS servers (https://learn.microsoft.com/en-us/azure/vpn-gateway/azure-vpn-client-optional-configurations).
To recap, after making these modifications, whenever a server or P2S VPN client needs to resolve your Azure File share FQDN (xyz.file.core.windows.net), the behavior will be consistent and be handled by your pair of DNS servers. Your DNS servers (once you remove the forward lookup zones from CONFIG1), will realize it doesn't know the answer for file.core.windows.net (nor should it), and forward to 168.63.129.16. If the VNET that your pair of DNS Servers are sitting in (shd-adds-westus3-vnet?), has a vnet link to the Private DNS Zone for your private endpoint, it will return the private endpoint IP.