Skip to content

Latest commit

 

History

History
400 lines (269 loc) · 16.7 KB

File metadata and controls

400 lines (269 loc) · 16.7 KB
title Manage inbound NAT rules for Azure Load Balancer
description In this article, you learn how to add and remove and inbound NAT rule using the Azure portal, PowerShell and CLI.
author mbender-ms
ms.author mbender
ms.service azure-load-balancer
ms.topic how-to
ms.date 12/06/2024
ms.custom
template-how-to
devx-track-azurepowershell
devx-track-azurecli
engagement-fy23
sfi-image-nochange

Manage inbound NAT rules for Azure Load Balancer

An inbound NAT rule is used to forward traffic from a load balancer frontend to one or more instances in the backend pool.

There are two types of inbound NAT rule:

  • Inbound NAT rule V1 for virtual machines: Targets a single machine in the backend pool of the load balancer.

  • Inbound NAT rule V2 for virtual machines and virtual machine scale sets: Targets multiple virtual machines in the backend pool of the load balancer.

In this article, you learn how to add and remove an inbound NAT rule for both types. You learn how to change the frontend port allocation in a multiple instance inbound NAT rule. You can choose from the Azure portal, PowerShell, or CLI examples.

[!INCLUDE quickstarts-free-trial-note]

Prerequisites

Inbound NAT rule V1 for virtual machines

Choose this option to configure a rule for a single VM. Select Azure portal, PowerShell, or CLI for instructions.

In this example, you create an inbound NAT rule to forward port 500 to backend port 443.

  1. Sign in to the Azure portal.

  2. In the search box at the top of the portal, enter Load balancer. Select Load balancers in the search results.

  3. Select myLoadBalancer or your load balancer.

  4. In the load balancer page, select Inbound NAT rules in Settings.

  5. Select + Add in Inbound NAT rules to add the rule.

  6. Enter or select the following information in Add inbound NAT rule.

    Setting Value
    Name Enter myInboundNATrule.
    Type Select Azure Virtual Machine.
    Target virtual machine Select the virtual machine that you wish to forward the port to. In this example, it's myVM1.
    Network IP configuration Select the IP configuration of the virtual machine. In this example, it's ipconfig1(10.1.0.4).
    Frontend IP address Select myFrontend.
    Frontend Port Enter 500.
    Service Tag Leave the default of Custom.
    Backend port Enter 443.
    Protocol Select TCP.
  7. Leave the rest of the settings at the defaults and select Add.

In this example, you create an inbound NAT rule to forward port 500 to backend port 443.

To save the configuration to the network interface, use Set-AzNetworkInterface.

## Place the load balancer information into a variable for later use. ##
$slb = @{
    ResourceGroupName = 'myResourceGroup'
    Name = 'myLoadBalancer'
}
$lb = Get-AzLoadBalancer @slb

## Create the single virtual machine inbound NAT rule. ##
$rule = @{
    Name = 'myInboundNATrule'
    Protocol = 'Tcp'
    FrontendIpConfiguration = $lb.FrontendIpConfigurations[0]
    FrontendPort = '500'
    BackendPort = '443'
}
$lb | Add-AzLoadBalancerInboundNatRuleConfig @rule

$lb | Set-AzLoadBalancer

## Add the inbound NAT rule to a virtual machine 

$NatRule = @{                                                                                       
    Name = 'MyInboundNATrule'
    LoadBalancer = $lb
}

$NatRuleConfig = Get-AzLoadBalancerInboundNatRuleConfig @NatRule 

$NetworkInterface = @{                                                                                           
     ResourceGroupName = 'myResourceGroup'
     Name = 'MyNIC'
 }

 $NIC = Get-AzNetworkInterface @NetworkInterface
 
 $IPconfig = @{                                                                                       
    Name = 'Ipconfig'
    LoadBalancerInboundNatRule = $NatRuleConfig
}

$NIC | Set-AzNetworkInterfaceIpConfig @IPconfig

$NIC | Set-AzNetworkInterface  

[!INCLUDE azure-cli-prepare-your-environment.md]

In this example, you will create an inbound NAT rule to forward port 500 to backend port 443. You will then attach the inbound NAT rule to a VM's NIC

    az network lb inbound-nat-rule create \
        --backend-port 443 \
        --lb-name myLoadBalancer \
        --name myInboundNATrule \
        --protocol Tcp \
        --resource-group myResourceGroup \
        --frontend-ip-name myFrontend \
        --frontend-port 500

    az network nic ip-config inbound-nat-rule add \
        --resource-group myResourceGroup \
        --nic-name MyNic \
        --ip-config-name MyIpConfig \
        --inbound-nat-rule MyNatRule \
        --lb-name myLoadBalancer


Inbound NAT rule V2 for virtual machines and virtual machine scale sets

Choose this option to configure a rule with a range of ports to a backend pool of virtual machines. Select Azure portal, PowerShell, or CLI for instructions.

In this example, you create an inbound NAT rule to forward a range of ports starting at port 500 to backend port 443. The maximum number of machines in the backend pool is set by the parameter Maximum number of machines in backend pool with a value of 500. This setting limits the backend pool to 500 virtual machines.

  1. Sign in to the Azure portal.

  2. In the search box at the top of the portal, enter Load balancer. Select Load balancers in the search results.

  3. Select myLoadBalancer or your load balancer.

  4. In the load balancer page, select Inbound NAT rules in Settings.

  5. Select + Add in Inbound NAT rules to add the rule.

  6. Enter or select the following information in Add inbound NAT rule.

    Setting Value
    Name Enter myInboundNATrule.
    Type Select Backend pool.
    Target backend pool Select your backend pool. In this example, it's myBackendPool.
    Frontend IP address Select your frontend IP address. In this example, it's myFrontend.
    Frontend port range start Enter 500.
    Maximum number of machines in backend pool Enter 500.
    Backend port Enter 443.
    Protocol Select TCP.
  7. Leave the rest at the defaults and select Add.

In this example, you create an inbound NAT rule to forward a range of ports starting at port 500 to backend port 443. The maximum number of machines in the backend pool is set by the parameter -FrontendPortRangeEnd with a value of 1000. This setting limits the backend pool to 500 virtual machines.

## Place the load balancer information into a variable for later use. ##
$slb = @{
    ResourceGroupName = 'myResourceGroup'
    Name = 'myLoadBalancer'
}
$lb = Get-AzLoadBalancer @slb

## Create the multiple virtual machines inbound NAT rule. ##
$rule = @{
    Name = 'myInboundNATrule'
    Protocol = 'Tcp'
    BackendPort = '443'
    FrontendIpConfiguration = $lb.FrontendIpConfigurations[0]
    FrontendPortRangeStart = '500'
    FrontendPortRangeEnd = '1000'
    BackendAddressPool = $lb.BackendAddressPools[0]
}
$lb | Add-AzLoadBalancerInboundNatRuleConfig @rule

$lb | Set-AzLoadBalancer

In this example, you create an inbound NAT rule to forward a range of ports starting at port 500 to backend port 443. The maximum number of machines in the backend pool is set by the parameter --frontend-port-range-end with a value of 1000. This setting limits the backend pool to 500 virtual machines.

    az network lb inbound-nat-rule create \
        --backend-port 443 \
        --lb-name myLoadBalancer \
        --name myInboundNATrule \
        --protocol Tcp \
        --resource-group myResourceGroup \
        --backend-pool-name myBackendPool \
        --frontend-ip-name myFrontend \
        --frontend-port-range-end 1000 \
        --frontend-port-range-start 500
        

Change frontend port allocation for a multiple VM rule

To accommodate more virtual machines in the backend pool in a multiple instance rule, change the frontend port allocation in the inbound NAT rule. In this example, you change the Maximum number of machines in backend pool from 500 to 1000. This setting increases the maximum number of machines in the backend pool to 1000.

  1. Sign in to the Azure portal.

  2. In the search box at the top of the portal, enter Load balancer. Select Load balancers in the search results.

  3. Select myLoadBalancer or your load balancer.

  4. In the load balancer page, select Inbound NAT rules in Settings.

  5. Select the inbound NAT rule you wish to change. In this example, it's myInboundNATrule.

  6. In the properties of the inbound NAT rule, change the value in Maximum number of machines in backend pool to 1000.

  7. Select Save.

To accommodate more virtual machines in the backend pool in a multiple instance rule, change the frontend port allocation in the inbound NAT rule. In this example, you change the parameter -FrontendPortRangeEnd to 1500. This setting increases the maximum number of machines in the backend pool to 1000.

## Place the load balancer information into a variable for later use. ##
$slb = @{
    ResourceGroupName = 'myResourceGroup'
    Name = 'myLoadBalancer'
}
$lb = Get-AzLoadBalancer @slb

## Set the new port allocation
$rule = @{
    Name = 'myInboundNATrule'
    Protocol = 'Tcp'
    BackendPort = '443'
    FrontendIpConfiguration = $lb.FrontendIpConfigurations[0]
    FrontendPortRangeStart = '500'
    FrontendPortRangeEnd = '1500'
    BackendAddressPool = $lb.BackendAddressPools[0]
}
$lb | Set-AzLoadBalancerInboundNatRuleConfig @rule

To accommodate more virtual machines in the backend pool, change the frontend port allocation in the inbound NAT rule. In this example, you change the parameter --frontend-port-range-end to 1500. This setting increases the maximum number of machines in the backend pool to 1000

    az network lb inbound-nat-rule update \
        --frontend-port-range-end 1500 \
        --lb-name myLoadBalancer \
        --name myInboundNATrule \
        --resource-group myResourceGroup
        

View port mappings

Port mappings for the virtual machines in the backend pool can be viewed by using the Azure portal.

  1. Sign in to the Azure portal.

  2. In the search box at the top of the portal, enter Load balancer. Select Load balancers in the search results.

  3. Select myLoadBalancer or your load balancer.

  4. In the load balancer page in, select Inbound NAT rules in Settings.

  5. Select myInboundNATrule or your inbound NAT rule.

  6. Scroll to the Port mapping section of the inbound NAT rule properties page.

Remove an inbound NAT rule

In this example, you remove an inbound NAT rule.

  1. Sign in to the Azure portal.

  2. In the search box at the top of the portal, enter Load balancer. Select Load balancers in the search results.

  3. Select myLoadBalancer or your load balancer.

  4. In the load balancer page in, select Inbound NAT rules in Settings.

  5. Select the three dots next to the rule you want to remove.

  6. Select Delete.

In this example, you remove an inbound NAT rule.

## Place the load balancer information into a variable for later use. ##
$slb = @{
    ResourceGroupName = 'myResourceGroup'
    Name = 'myLoadBalancer'
}
$lb = Get-AzLoadBalancer @slb

## Remove the inbound NAT rule
$lb | Remove-AzLoadBalancerInboundNatRuleConfig -Name 'myInboundNATrule'

$lb | Set-AzLoadBalancer

In this example, you remove an inbound NAT rule.

    az network lb inbound-nat-rule delete \
        --lb-name myLoadBalancer \
        --name myInboundNATrule \
        --resource-group myResourceGroup

Next steps

In this article, you learned how to manage inbound NAT rules for an Azure Load Balancer using the Azure portal, PowerShell and CLI.

For more information about Azure Load Balancer, see: