Filter network traffic by using network security groups
Although Azure Firewall and Azure DDoS Protection can help control what traffic can come from outside sources, Tailwind Traders also wants to understand how to protect its internal networks on Azure. Doing so will give the company an extra layer of defense against attacks.
In this part, you examine network security groups (NSGs).
What are network security groups?
A network security group enables you to filter network traffic to and from Azure resources within an Azure virtual network. You can think of NSGs like an internal firewall. An NSG can contain multiple inbound and outbound security rules that enable you to filter traffic to and from resources by source and destination IP address, port, and protocol.
How do I specify NSG rules?
A network security group can contain as many rules as you need, within Azure subscription limits. Each rule specifies these properties:
Property | Description |
---|---|
Name | A unique name for the NSG. |
Priority | A number between 100 and 4096. Rules are processed in priority order, with lower numbers processed before higher numbers. |
Source or Destination | A single IP address or IP address range, service tag, or application security group. |
Protocol | TCP, UDP, or Any. |
Direction | Whether the rule applies to inbound or outbound traffic. |
Port Range | A single port or range of ports. |
Action | Allow or Deny. |
When you create a network security group, Azure creates a series of default rules to provide a baseline level of security.
You can’t remove the default rules, but you can override them by creating new rules with higher priorities.