Networking Considerations for Azure Files
Here’s a concise summary of the article “Azure Files networking considerations.”
Overview
Azure file shares can be accessed via:
Public endpoint (internet-exposed)
Private endpoints (private IPs in one or more VNets)
Cached on-premises via Azure File Sync (SMB only) — see Introduction to Azure File Sync
Configure access at the storage account level (the top-level management object for Azure Files).
Applies to
SMB: supported on standard (GPv2) and premium (FileStorage) file shares.
NFS: supported on premium (FileStorage) only.
Key networking considerations
SMB uses TCP port 445; many organizations/ISPs block outbound 445. SMB 3.x is encrypted and internet-safe, but legacy blocking policies may prevent mounts without additional networking work.
NFS relies on network-level authentication and is only accessible from restricted networks (requires networking configuration).
Secure transfer
By default, storage accounts require secure transfer. For Azure Files, this affects SMB, NFS, and FileREST:
With Secure transfer required enabled:
SMB shares require SMB 3.x with AES-128-CCM/GCM or AES-256-GCM encryption. You can configure allowed SMB encryption algorithms via SMB security settings.
FileREST only accepts HTTPS.
Disabling Secure transfer allows unencrypted SMB (including SMB 2.1) and HTTP for FileREST.
Azure Files uses TLS for client-storage communication.
Public endpoint
Default endpoint; can be disabled.
SMB: accessible from anywhere using SMB 3.x with encryption. For SMB 2.1 or SMB 3.x without encryption, two conditions must be met: Secure transfer disabled, and the request must originate from inside the Azure region.
NFS: public endpoint access only when the storage account’s public endpoint is restricted to specific VNets via service endpoints.
FileREST: accessible via public endpoint; HTTPS required if secure transfer is enabled.
Public endpoint firewall settings
Storage account firewall can restrict the public endpoint by IP ranges, virtual networks, or disable it entirely.
Service endpoints let you restrict access to specific VNets while still using the storage account’s public IP (the networking layer validates the VNet origin).
NFS via public endpoint requires service endpoints.
Private endpoints
Provide a private IP for a storage account in a VNet subnet. A storage account can have private endpoints in multiple VNets.
Benefits:
Secure access from on-premises via VPN or ExpressRoute (private-peering).
Ability to block public endpoint connections (note: creating a private endpoint doesn’t automatically block the public endpoint).
Reduce risk of data exfiltration by restricting where storage can be reached.
See Configuring private endpoints for Azure Files to create private endpoints.
Tunneling traffic (VPN / ExpressRoute)
To access SMB/NFS from on-premises using private endpoints, you must tunnel traffic via:
Azure VPN Gateway:
Point-to-Site (P2S) — per-client VPN useful for telecommuters. See P2S guides for Windows and Linux.
Site-to-Site (S2S) — single site-level configuration for an organization’s network.
ExpressRoute — private, dedicated connectivity (non-internet) useful for performance or compliance needs.
Note: You can technically route to the public endpoint over VPN, but this requires hard-coding storage cluster IPs (brittle, not recommended).
DNS configuration
Creating a private endpoint normally creates/updates a private DNS zone for the privatelink subdomain and adds A/CNAME records so the storage account name resolves to the private IP within the linked VNet.
From on-premises, the storage account name normally resolves to the public IP. To make it resolve to a private endpoint from on-premises, options include:
Editing hosts files (not recommended for production).
Creating A records in on-prem DNS (works but brittle).
Forwarding the core.chinacloudapi.cn zone from on-prem DNS to the Azure private DNS zone (recommended approach). Azure provides scripts to deploy DNS forwarders in VNet to simplify this.
Use Resolve-DnsName / nslookup to verify resolution. See Configuring DNS with Azure Files for details.
SMB over QUIC
QUIC-based SMB (uses UDP/port 443 instead of TCP/445) is supported in Windows Server 2022 Azure Edition (server) and Windows 11 clients, offering a more internet-friendly transport.
Azure Files does not currently support SMB over QUIC directly. A viable option is to use Azure File Sync on Windows Server 2022 Azure Edition to provide SMB-over-QUIC access to cached shares (on-prem or in other datacenters).
See Deploy Azure File Sync and SMB over QUIC for more details.
References
Azure Files overview
Planning for an Azure Files deployment
Intro to Azure File Sync
Last updated: 07/08/2025
If you’d like, I can:
Produce a compact checklist for setting up secure SMB access from on-premises.
Create a step-by-step summary for configuring private endpoints and DNS forwarding.
Extract all links referenced in the article into a single list.
Was this helpful?