Inbound ports for the Azure network security group
This section describes the rules that should be added to an Azure network security group.
The following tables describe the rules that should be added to an Azure network security group:
NOTE:If you want to restrict the source traffic, set the source with IPv4 or IPv6 CIDR block, or a single IPv4 or IPv6 address.
NOTE:Protection Software no longer supports HTTP access to TCP port 80. Use the HTTPS ports 443 to access these services instead.
For all table entries:
- The
Source and
Destination fields are
Any.
- The
Source port range field is
*
- The
Action is
Allow.
- Assign a unique priority value to each rule, starting at 100.
- Type a unique description for each rule. The value must be unique for both inbound and outbound rules.
Table 1. Inbound ports for the Azure network security groupInbound ports for the Azure network security group
Type
|
Protocol
|
Destination port range
|
SSH
|
TCP
|
22
|
Custom TCP Rule
|
TCP
|
161
|
Custom UDP Rule
|
UDP
|
161
|
Custom TCP Rule
|
TCP
|
163
|
Custom UDP Rule
|
UDP
|
163
|
HTTPS
|
TCP
|
443
|
Custom TCP Rule
|
TCP
|
700
|
Custom TCP Rule
|
TCP
|
7543
|
Custom TCP Rule
|
TCP
|
7778 - 7781
|
Custom TCP Rule
|
TCP
|
8543
|
Custom TCP Rule
|
TCP
|
9090
|
Custom TCP Rule
|
TCP
|
9443
|
Custom TCP Rule
|
TCP
|
27000
|
Custom TCP Rule
|
TCP
|
28001 - 28002
|
Custom TCP Rule
|
TCP
|
28810 - 28819
|
Custom TCP Rule
|
TCP
|
29000
|
Custom TCP Rule
|
TCP
|
30001 - 30010
|