Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

Dell EMC PowerProtect DP Series Appliance 2.7.7 Upgrade Guide for DP4400 and DP5900

PDF

Inbound ports for the Azure network security group

This section describes the rules that should be added to an Azure network security group.

The following tables describe the rules that should be added to an Azure network security group:

NOTE:If you want to restrict the source traffic, set the source with IPv4 or IPv6 CIDR block, or a single IPv4 or IPv6 address.
NOTE:Protection Software no longer supports HTTP access to TCP port 80. Use the HTTPS ports 443 to access these services instead.

For all table entries:

  • The Source and Destination fields are Any.
  • The Source port range field is *
  • The Action is Allow.
  • Assign a unique priority value to each rule, starting at 100.
  • Type a unique description for each rule. The value must be unique for both inbound and outbound rules.
Table 1. Inbound ports for the Azure network security groupInbound ports for the Azure network security group
Type Protocol Destination port range
SSH TCP 22
Custom TCP Rule TCP 161
Custom UDP Rule UDP 161
Custom TCP Rule TCP 163
Custom UDP Rule UDP 163
HTTPS TCP 443
Custom TCP Rule TCP 700
Custom TCP Rule TCP 7543
Custom TCP Rule TCP 7778 - 7781
Custom TCP Rule TCP 8543
Custom TCP Rule TCP 9090
Custom TCP Rule TCP 9443
Custom TCP Rule TCP 27000
Custom TCP Rule TCP 28001 - 28002
Custom TCP Rule TCP 28810 - 28819
Custom TCP Rule TCP 29000
Custom TCP Rule TCP 30001 - 30010

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\