You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can configure the required NSG rules using the Azure portal or PowerShell.
48
+
47
49
### [Portal](#tab/portal)
48
50
49
51
### <aname="apply"></a>AzureBastionSubnet
50
52
51
-
Azure Bastion is deployed specifically to ***AzureBastionSubnet***.
53
+
Use the following steps to configure NSG rules for the AzureBastionSubnet.
52
54
53
-
***Ingress traffic:**
55
+
1. Sign in to the [Azure portal](https://portal.azure.com).
56
+
1. Go to **Network security groups** and select the NSG that's associated with your **AzureBastionSubnet**.
57
+
1. Select **Inbound security rules** on the left side, then select **+ Add** to create the following ingress rules:
54
58
55
59
***Ingress from internet (port 443):** Enable port 443 inbound from the **Internet** service tag. Ports 3389 and 22 are not required on AzureBastionSubnet. The source can be **Internet** or a set of specific public IP addresses you specify.
56
60
***Ingress from GatewayManager (port 443):** Enable port 443 inbound from the **GatewayManager** service tag. This allows the control plane (Gateway Manager) to communicate with your Bastion host.
@@ -60,7 +64,7 @@ Azure Bastion is deployed specifically to ***AzureBastionSubnet***.
1. Select **Outbound security rules** on the left side, then select **+ Add** to create the following egress rules:
64
68
65
69
***Egress to target VMs (ports 3389, 22):** Enable outbound traffic to target VM subnets on ports 3389 and 22 over private IP. If you use the custom port feature with the Standard SKU, allow outbound traffic to the **VirtualNetwork** service tag instead.
66
70
***Egress to VirtualNetwork (ports 8080, 5701):** Enable ports 8080 and 5701 outbound from the **VirtualNetwork** service tag to the **VirtualNetwork** service tag. This enables the internal components of Azure Bastion to communicate with each other.
@@ -72,7 +76,10 @@ Azure Bastion is deployed specifically to ***AzureBastionSubnet***.
72
76
73
77
### Target VM subnet
74
78
75
-
This is the subnet that contains the target virtual machine that you want to connect to.
79
+
Use the following steps to configure the NSG rules for the subnet that contains your target virtual machine.
80
+
81
+
1. In the Azure portal, go to **Network security groups** and select the NSG that's associated with your target VM subnet.
82
+
1. Select **Inbound security rules**, then select **+ Add** to create the following rule:
76
83
77
84
***Ingress from AzureBastionSubnet (ports 3389, 22):** Open RDP/SSH ports (3389 and 22 respectively, or custom values if you use the custom port feature with Standard or Premium SKU) inbound on the target VM subnet over private IP. Without this rule, Bastion can't reach your VMs even when it's correctly configured. As a best practice, scope the source to the AzureBastionSubnet IP address range so that only Bastion can open these ports -- not the broader internet.
0 commit comments