How to create Azure Network Security Group: Difference between revisions

From PUBLIC-WIKI
Jump to navigation Jump to search
Eyales (talk | contribs)
No edit summary
Eyales (talk | contribs)
No edit summary
 
Line 28: Line 28:
* Click on Add
* Click on Add
* For more information about creation of inbound or outbound rules, see: https://docs.microsoft.com/en-us/azure/virtual-machines/windows/nsg-quickstart-portal
* For more information about creation of inbound or outbound rules, see: https://docs.microsoft.com/en-us/azure/virtual-machines/windows/nsg-quickstart-portal
* From the main pane, click on Network interfaces -> click on Associate -> select an existing network interface from the list
* Click on OK
* From the main pane, click on Subnets -> click on Associate -> select an existing subnet from the list
* Click on OK
* Logoff the Microsoft Azure Portal

Latest revision as of 12:43, 30 April 2018

Creating a network security group

  • Login to the Azure Portal:
https://portal.azure.com
  • From the upper search pane, write "Network Security Groups" -> click on "Create network security group" or "Add":
  • Name: Specify a name for the new network security group
  • Subscription: Select the relevant subscription name
  • Resource group: Select either existing or create a new resource group
For more information, see: https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-overview#resource-groups
  • Location: Select a region close to your location
  • Click on Create
  • Wait for the deployment on the new network security group to complete
  • From the "Network Security Groups" window, click on the newly created network security group
  • From the main pane, click on Tags -> add a new tag:
  • Name: Specify here Name
  • Value: Specify here the name of the newly created network security group
  • Click on Save
  • From the main pane, click on Inbound security rules -> click on Add -> use the example below in-order to create an inbound rule:
  • Source: Select IP Address
  • Source IP addresses/CIDR ranges: Specify here a static public IP address or your organization public address/CIDR
  • Source port ranges: Leave the default
  • Destination: Select IP Addresses
  • Destination IP addresses/CIDR ranges: Specify here public IP address of an Azure Virtual machine
  • Destination port ranges: Specify here 22
  • Protocol: TCP
  • Action: Allow
  • Priority: Leave the default settings
  • Name: Specify here a description for the new rule (for example: Inbound SSH access)
  • Click on Add
  • For more information about creation of inbound or outbound rules, see: https://docs.microsoft.com/en-us/azure/virtual-machines/windows/nsg-quickstart-portal
  • From the main pane, click on Network interfaces -> click on Associate -> select an existing network interface from the list
  • Click on OK
  • From the main pane, click on Subnets -> click on Associate -> select an existing subnet from the list
  • Click on OK
  • Logoff the Microsoft Azure Portal