Default Security Rules
Azure provides the default security rules for both incoming and outcoming traffic in each network security group that we create:
Default Inbound Security Rules
Priority | Name | Source | Source Port Ranges | Destination | Destination Port Ranges | Protocol | Action |
---|---|---|---|---|---|---|---|
100 | AllowVnetInBound | VirtualNetwork | * | VirtualNetwork | * | * | Allow |
200 | AllowAzureLoadBalancerInBound | AzureLoadBalancer | * | Any | * | * | Allow |
65000 | DenyAllInBound | Any | * | Any | * | * | Deny |
Default Outbound Security Rules
Priority | Name | Source | Source Port Ranges | Destination | Destination Port Ranges | Protocol | Action |
---|---|---|---|---|---|---|---|
100 | AllowVnetOutBound | VirtualNetwork | * | VirtualNetwork | * | * | Allow |
65000 | DenyAllOutBound | Any | * | Any | * | * | Deny |
Azure Network Security Groups
Network Security Groups (NSG) play a crucial role in securing the virtual environment within Azure. Azure provides various services to help users secure their applications and the infrastructure that users create.
Table of Content
- What is Azure?
- What are Azure Networks?
- Traditional Server Management
- Problem in Traditional Server Management
- Network Security Groups As A Solution
- How Do Azure Network Security Groups Work?
- Azure Network Security Rules
- Default Security Rules
- Augmented Security Group Rules
- Service Tags In Azure Networks
- What Are Application Security Groups?
- How Azure Network Security Groups Filter Network Traffic?
- Best Practices For Implementing NSG in Azure
- How to Create NSG in Azure Portal? A Step-By-Step Guide
- Video Demonstration of Azure Network Security Groups with Virtual Machine
- Association of Network Security Groups
- Virtual Network And Subnet Design
- Azure Platform Considerations
- Conclusion
- Azure Network Security Groups – FAQs