Configure networking
Create a Microsoft Azure virtual machine, a security group, and inbound security rules, then associate the security rules with the virtual machine.
Create a security group
- Sign in to the Microsoft Azure Portal.
- From the menu, select All Services and search for Resource Groups. Alternatively, select Resource Groups from the favorites list.
- Click the name of the resource group where you want to add the network security rule set.
- Click Add.
- Search and select Network security group.
- Select Create.
- Name the security group.
- Click Create and Review.
- Click Create.
Create inbound security rules
- In Settings, click Inbound security rules.
- Click Add.
- Enter the following values:
- Destination port range: 80/443
- Protocol: TCP
- Name: Port80/Port443 Rule
- Priority: 100/101
Port 80 is optional.
- Click Add.
- Repeat these steps to create rules for ports 80 and 443.
Associate security rules
- Go to .
- Click the name of Access Gateway virtual machine.
- In Settings, select Subnets.
- Click Associate.
- Search for the security group that you created earlier and associate it with the virtual machine.
- Create a network security using the az network nsg create command:
az network nsg create --resource-group AccessGateway --location <location> --name <name>
- <location> is the region to house the security group.
- <resource-group> is the name of the resource group that you created earlier.
- <name> is the name of the new security group.
Here is an example of the az network nsg create command with the parameters populated with values:
az network nsg create --resource-group AccessGateway --location eastus --name AGSecurityGroup
When you run the az network nsg create command, the following results appear:
{ "NewNSG": { "defaultSecurityRules": [ { "destinationAddressPrefixes": [], "destinationApplicationSecurityGroups": null, . . . ]} }
- Add a network security rule for port 80 using the az network nsg rule create command. Port 80 is optional:
az network nsg rule create \ --resource-group <resource-group>\ --nsg-name <network-security-group>\ --name <rule-name>\ --protocol tcp \ --priority 1000 \ --destination-port-range 80
- <resource-group> is the name of the previously created resource group.
- <nework-security-group> is the name of the new security group.
- <rule-name> is a name for the rule.
Here is an example of the az network nsg rule create command with the parameters populated with values:
az network nsg rule create --resource-group AccessGateway --nsg-name AGSecurityGroup \ --name Port80GroupRule --protocol tcp --priority 1000 --destination-port-range 80
When you run the az network nsg rule create command, the following results appear:
{- Finished "access": "Allow", "description": null, "destinationAddressPrefix": "*", . . . }
- Add a network security rule for port 443 using the az network nsg rule create command:
az network nsg rule create --resource-group AccessGateway --nsg-name AGSecurityGroup \ --name Port443GroupRule --protocol tcp --priority 1001 --destination-port-range 443
When you run the az network nsg rule create command, the following results appear:
{- Finished "access": "Allow", "description": null, "destinationAddressPrefix": "*", . . . } - Associate the new security group with the VM nic using the az network nic update command:
az network nic update \ --resource-group <resource-group>\ --name <nic-name>\ --network-security-group <security-group-name>
- <resource-group> is the name of the resource group created earlier.
- <nic-name> is the name of nic to associate the security group with.
- <nework-security-group> is the name of the new security group.
Here's an example of the az network nic update command with the parameters populated with values:
# obtain the name of the nic. az vm nic list --resource-group AccessGateway --vm-name "OAG5.0vm" [{ "id": "/subscriptions/. . . /networkInterfaces/OAG5.0VMVMNic", . . . }] # Assign the security group to the nic az network nic update \ --resource-group AccessGateway\ --name OAG5.0VMMVNic --network-security-group AGSecurityGroupWhen you run the az network nic update command, the following results appear:
{{"dnsSettings": { "dnsSettings": { appliedDnsServers": [], . . . }