Skip to content
Pass Microsoft, Cisco, Sap and Salesforce Exams
Menu
  • Home
  • Exams
  • Certifications
  • Cloud Computing
  • Cyber Security
  • Contact Us
  • Log in
  • Sign up
Menu

Configure secure access to virtual networks

Posted on 2024-09-062024-09-06 by zeusexam

Skill 4.2: Configure secure access to virtual networks

Network security groups (NSGs) control which network flows are permitted into and out of your virtual networks and virtual machines. Each NSG contains lists of inbound and outbound rules, which give you fine-grained control over exactly which network flows are allowed or denied. Combine this with the use of service and private endpoints, which provide connectivity to Azure PaaS services directly from your virtual network, and you have the tools that you need to configure secure, private connectivity from your VMs to Azure services.

Create and configure network security groups and application security groups

A network security group (NSG) is a standalone Azure resource, which acts as a networking filter. Each NSG contains a list of security rules. These are used to allow or deny inbound or out- bound network traffic, depending on the properties of that traffic, such as protocol, IP address, and port. When you apply the NSG, it is associated with either a subnet or with a specific VM’s network interface.

NSG rules

NSG rules define which traffic flows are allowed or denied by the NSG. Table 4-4 describes the properties of an NSG rule.

TABLE 4-4 NSG properties

PropertyDescriptionConstraintsConsiderations
NameThe name of the rule.Must be unique within the region. Must end with a letter, number, or underscore. Cannot exceed 80 characters.You can have several rules within an NSG, so make sure you follow a naming convention that allows you to identify the purpose of each rule.
ProtocolThe network protocol the rule applies to.TCP, UDP, or *.Using * as a protocol includes ICMP as well as TCP and UDP. In the Azure portal, select ‘Any’ instead of ‘*’.
PropertyDescriptionConstraintsConsiderations
Source port range(s)Source port range(s) to match for the rule.Single port number from 1 to 65535; a port range (exam- ple: 1–65535); a list of port or port ranges; or * (for all ports).The source ports could be ephemeral, so unless your client program is using a specific port, use * in most cases. Try to reduce the number of rules by specifying multiple ports or port ranges in a single rule.
Destination port rangeDestination port range(s) to match for the rule.Single port number from 1 to 65535, port range (such as 1–65535), a list of port or port ranges, or * (for all ports).Try to reduce the number of rules by specifying multiple ports or port ranges in a single rule.
Source address prefix(es)Source address prefix(es) or service tag(s) to match for the rule.Single IP address (such as 10.10.10.10), IP subnet (such as 192.168.1.0/24), a service tag, a list of the above, or * (for all addresses).Consider using ranges, service tags, and lists to reduce the number of rules. The IP addresses of Azure VMs can also be specified implic- itly using application security groups.
Destination address prefix(es)Destination address prefix(es) or service tag(s) to match for the rule.Single IP address (such as 10.10.10.10); IP subnet (such as 192.168.1.0/24); a service tag; a list of the above; or * (for all addresses).Consider using ranges, default tags, and lists to reduce the num- ber of rules. The IP addresses of Azure VMs can also be specified implicitly using application security groups.
DirectionDirection of traffic to match for the rule.Inbound or outbound.Inbound and outbound rules are processed separately, based on traffic direction.
PriorityRules are checked in the order of priority. Once a matching rule is found, no more rules are tested.Unique number between 100 and 4096. Uniqueness is only within this NSG.Consider creating rules and jumping priorities by 100 for each rule to leave space for new rules you might create in the future.
ActionType of action to apply if the rule matches.Allow or deny.Keep in mind that if an allow rule is not found for a packet, the packet is dropped.

Post navigation

← DNS Message Format
DHCP Services – 100-150 Exam Guide →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • 100-150 Study Course
  • AWS Study Course
  • AZ-104 Study Course
  • Certified Advanced Salesforce Admin
  • Cisco Study Course
  • CLF-C02 Study Course
  • Google
  • Google Associate Cloud Engineer
  • Microsoft Study Course
  • Salesforce
  • Study Course
© 2024 Zeusexam, Inc. All rights reserved. | Privacy Statement | Terms of Use | Use of Cookies | Trust | Accessibility | Cookie Preferences | Your Privacy Choices