![]() ![]() Egress Traffic to Azure Bastion data plane: For data plane communication between the underlying components of Azure Bastion, enable ports 8080, 5701 outbound from the VirtualNetwork service tag to the VirtualNetwork service tag.If you are using the custom port feature as part of Standard SKU, the NSGs will instead need to allow egress traffic to other target VM subnets for the custom value(s) you have opened on your target VMs. The NSGs need to allow egress traffic to other target VM subnets for port 3389 and 22. ![]() Egress Traffic to target VMs: Azure Bastion will reach the target VMs over private IP.This enables Azure Load Balancer to detect connectivity Ingress Traffic from Azure Load Balancer: For health probes, enable port 443 inbound from the AzureLoadBalancer service tag. ![]() This enables the components of Azure Bastion to talk to each other.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |