Outbound ports for the Azure network security group
This section describes the outbound ports for the Azure network security group.
NOTE:If you want to restrict the source of traffic, set the source with IPv4 or IPv6 CIDR block, or a single IPv4 or IPv6 address.
By default, Azure has a rule
AllowInternetOutBound with priority
65001 to allow all outbound internet traffic. Override this rule by adding a rule with a priority (that is, an integer number) that is greater than all customized rules' priority, and less than 65000:
source: *, destination: *, protocol: *, action: Deny. Azure documentation contains information about creating a firewall rule.
For all table entries:
The
Source and
Destination fields are
Any.
The
Source port range field is
*
The
Action is
Allow.
Assign a unique priority value to each rule, starting at 100.
Type a unique description for each rule. The value must be unique for both inbound and outbound rules.
Table 1. Outbound ports for the Azure network security groupOutbound ports for the Azure network security group
Type
Protocol
Destination port range
Custom TCP Rule
TCP
7
SSH
TCP
22
SMTP
TCP
25
DNS (UDP)
UDP
53
Custom TCP Rule
TCP
111
Custom UDP Rule
UDP
111
Custom TCP Rule
TCP
161
Custom UDP Rule
UDP
161
Custom TCP Rule
TCP
163
Custom UDP Rule
UDP
163
HTTPS
TCP
443
Custom TCP Rule
TCP
700
Custom TCP Rule
TCP
2049
Custom UDP Rule
UDP
2049
Custom TCP Rule
TCP
2052
Custom UDP Rule
UDP
2052
Custom TCP Rule
TCP
3008
Custom TCP Rule
TCP
3009
Custom TCP Rule
TCP
8443
Custom TCP Rule
TCP
8888
Custom TCP Rule
TCP
9090
Custom TCP Rule
TCP
9443
Custom TCP Rule
TCP
27000
Custom TCP Rule
TCP
28001-28010
Custom TCP Rule
TCP
29000
Custom TCP Rule
TCP
30001-30010
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\