Define firewall rules that control the traffic for your instance and configure network security groups to the interfaces of your BlueCat Azure VM.
- SSH port 22
- Custom TCP Rule with port number 123 for NTP (inbound only)
- Custom TCP Rule with port number 161 for SNMP (inbound only)
- Custom TCP Rule with port number 10042 for secure management and connectivity between BlueCat DNS for Microsoft Azure and Address Manager
- Custom Any Rule with port number 53 for DNSNote: For more information on using network security groups to filter traffic on Azure Virtual Networks, refer to https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-nsg.Note: For more information about BlueCat appliance service ports, refer to "Appendix A: Network Requirements" in the Address Manager Administration Guide.
To define network security group settings to your BlueCat Azure virtual appliance:
- Log in to the Azure Portal.
- Click Virtual Machines in the left-nav.
- From the list of virtual machines, click the name of the virtual machine you wish to configure with a network security group.
- Under Settings, click Networking.
- Click one of the interfaces of your BlueCat Azure VM, for example azure-bdds-nic-eth0. The Network Interface page opens.
- Under Settings, click Network security group.
- Click Edit then choose a Network Security Group or select None.
Note: OPTIONAL: you can also configure a network security group on subnets. This will propagate the network security group settings to all interfaces on that subnet.
Repeat this task for additional interfaces.