enhance: clarify Netcup DNS-01 UDP firewall workaround

This commit is contained in:
Laurence
2026-02-18 07:48:26 +00:00
parent 907c9c1e8b
commit 4ac01fecf9

View File

@@ -255,6 +255,12 @@ Traefik supports most DNS providers. You can find a full list of supported provi
- Check API token permissions and scope - Check API token permissions and scope
- Ensure DNS propagation has completed - Ensure DNS propagation has completed
- Review provider-specific configuration - Review provider-specific configuration
<Info>
**Known issue with Netcup**: DNS-01 can fail on Netcup due to how their provider firewall handles UDP. DNS replies may be treated as inbound traffic **from source port `53`** and get dropped.
**Workaround**: Allow **ingress UDP** with **source port `53`** (to your server's UDP ports, or `ANY`). Repeat this for other UDP-based services if needed.
</Info>
</Accordion> </Accordion>
<Accordion title="Old certificates still being used"> <Accordion title="Old certificates still being used">
@@ -262,4 +268,4 @@ Traefik supports most DNS providers. You can find a full list of supported provi
**Solution**: Delete the `acme.json` file to force new certificate generation. **Solution**: Delete the `acme.json` file to force new certificate generation.
</Accordion> </Accordion>
</AccordionGroup> </AccordionGroup>