How to create Azure Network Security Group: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 28: | Line 28: | ||
* Click on Add | * Click on Add | ||
* For more information about creation of inbound or outbound rules, see: https://docs.microsoft.com/en-us/azure/virtual-machines/windows/nsg-quickstart-portal | * For more information about creation of inbound or outbound rules, see: https://docs.microsoft.com/en-us/azure/virtual-machines/windows/nsg-quickstart-portal | ||
* From the main pane, click on Network interfaces -> click on Associate -> select an existing network interface from the list | |||
* Click on OK | |||
* From the main pane, click on Subnets -> click on Associate -> select an existing subnet from the list | |||
* Click on OK | |||
* Logoff the Microsoft Azure Portal |
Latest revision as of 12:43, 30 April 2018
Creating a network security group
- Login to the Azure Portal:
- From the upper search pane, write "Network Security Groups" -> click on "Create network security group" or "Add":
- Name: Specify a name for the new network security group
- Subscription: Select the relevant subscription name
- Resource group: Select either existing or create a new resource group
- For more information, see: https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-overview#resource-groups
- Location: Select a region close to your location
- Click on Create
- Wait for the deployment on the new network security group to complete
- From the "Network Security Groups" window, click on the newly created network security group
- From the main pane, click on Tags -> add a new tag:
- Name: Specify here Name
- Value: Specify here the name of the newly created network security group
- Click on Save
- From the main pane, click on Inbound security rules -> click on Add -> use the example below in-order to create an inbound rule:
- Source: Select IP Address
- Source IP addresses/CIDR ranges: Specify here a static public IP address or your organization public address/CIDR
- Source port ranges: Leave the default
- Destination: Select IP Addresses
- Destination IP addresses/CIDR ranges: Specify here public IP address of an Azure Virtual machine
- Destination port ranges: Specify here 22
- Protocol: TCP
- Action: Allow
- Priority: Leave the default settings
- Name: Specify here a description for the new rule (for example: Inbound SSH access)
- Click on Add
- For more information about creation of inbound or outbound rules, see: https://docs.microsoft.com/en-us/azure/virtual-machines/windows/nsg-quickstart-portal
- From the main pane, click on Network interfaces -> click on Associate -> select an existing network interface from the list
- Click on OK
- From the main pane, click on Subnets -> click on Associate -> select an existing subnet from the list
- Click on OK
- Logoff the Microsoft Azure Portal