Skip to content

Commit b9b3654

Browse files
authored
Update Protocol details in NSG rules documentation
Expanded the Protocol description to include ESP and AH protocols, and clarified their availability via JSON templates and PowerShell.
1 parent 2dfde87 commit b9b3654

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

learn-pr/wwl-azure/configure-network-security-groups/includes/3-determine-network-security-groups-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Let's review the characteristics of security rules in network security groups.
1717
| Source | Any, IP Addresses, My IP address, Service Tag, or Application security group |
1818
| Source port ranges | Specify the ports on which the rule allows or denies traffic |
1919
| Destination | Any, IP Addresses, Service Tag, or Application security group |
20-
| Protocol | Restrict the rule to the Transmission Control Protocol (TCP), User Datagram Protocol (UDP), or Internet Control Message Protocol (ICMP). The default is for the rule to apply to all protocols (Any). |
20+
| Protocol | Restrict the rule to Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), Encapsulating Security Payload (ESP), or Authentication Header (AH). ESP and AH protocols are only available via JSON templates and PowerShell. The default is for the rule to apply to all protocols (Any). |
2121
| Action | Allow or Deny |
2222
| Priority | A value between 100 and 4,096 that's unique for all security rules within the NSG |
2323

0 commit comments

Comments
 (0)