Skip to content

Commit be6bbc8

Browse files
committed
Add intro text before tabs and portal navigation steps
1 parent 705f332 commit be6bbc8

1 file changed

Lines changed: 11 additions & 4 deletions

File tree

articles/bastion/bastion-nsg.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,13 +44,17 @@ The following table summarizes all required NSG rules.
4444
| AllowBastionCommunication | Outbound | VirtualNetwork | VirtualNetwork | 8080, 5701 | * |
4545
| AllowHttpOutbound | Outbound | * | Internet | 80 | * |
4646

47+
You can configure the required NSG rules using the Azure portal or PowerShell.
48+
4749
### [Portal](#tab/portal)
4850

4951
### <a name="apply"></a>AzureBastionSubnet
5052

51-
Azure Bastion is deployed specifically to ***AzureBastionSubnet***.
53+
Use the following steps to configure NSG rules for the AzureBastionSubnet.
5254

53-
* **Ingress traffic:**
55+
1. Sign in to the [Azure portal](https://portal.azure.com).
56+
1. Go to **Network security groups** and select the NSG that's associated with your **AzureBastionSubnet**.
57+
1. Select **Inbound security rules** on the left side, then select **+ Add** to create the following ingress rules:
5458

5559
* **Ingress from internet (port 443):** Enable port 443 inbound from the **Internet** service tag. Ports 3389 and 22 are not required on AzureBastionSubnet. The source can be **Internet** or a set of specific public IP addresses you specify.
5660
* **Ingress from GatewayManager (port 443):** Enable port 443 inbound from the **GatewayManager** service tag. This allows the control plane (Gateway Manager) to communicate with your Bastion host.
@@ -60,7 +64,7 @@ Azure Bastion is deployed specifically to ***AzureBastionSubnet***.
6064

6165
:::image type="content" source="./media/bastion-nsg/inbound.png" alt-text="Screenshot shows inbound security rules for Azure Bastion connectivity." lightbox="./media/bastion-nsg/inbound.png":::
6266

63-
* **Egress traffic:**
67+
1. Select **Outbound security rules** on the left side, then select **+ Add** to create the following egress rules:
6468

6569
* **Egress to target VMs (ports 3389, 22):** Enable outbound traffic to target VM subnets on ports 3389 and 22 over private IP. If you use the custom port feature with the Standard SKU, allow outbound traffic to the **VirtualNetwork** service tag instead.
6670
* **Egress to VirtualNetwork (ports 8080, 5701):** Enable ports 8080 and 5701 outbound from the **VirtualNetwork** service tag to the **VirtualNetwork** service tag. This enables the internal components of Azure Bastion to communicate with each other.
@@ -72,7 +76,10 @@ Azure Bastion is deployed specifically to ***AzureBastionSubnet***.
7276

7377
### Target VM subnet
7478

75-
This is the subnet that contains the target virtual machine that you want to connect to.
79+
Use the following steps to configure the NSG rules for the subnet that contains your target virtual machine.
80+
81+
1. In the Azure portal, go to **Network security groups** and select the NSG that's associated with your target VM subnet.
82+
1. Select **Inbound security rules**, then select **+ Add** to create the following rule:
7683

7784
* **Ingress from AzureBastionSubnet (ports 3389, 22):** Open RDP/SSH ports (3389 and 22 respectively, or custom values if you use the custom port feature with Standard or Premium SKU) inbound on the target VM subnet over private IP. Without this rule, Bastion can't reach your VMs even when it's correctly configured. As a best practice, scope the source to the AzureBastionSubnet IP address range so that only Bastion can open these ports -- not the broader internet.
7885

0 commit comments

Comments
 (0)