Quantcast
Channel: Azure Networking (DNS, Traffic Manager, VPN, VNET) forum
Viewing all articles
Browse latest Browse all 6513

inbound rules in network security group not applying.

$
0
0

Hi I seem to have an issue with creating a new inbound security rule on my azure portal. I have created 10 other ones which seems to working fine. The new one I created yesterday seems not to be applying.

Priority: 2100

Source: any

protocol: any

Source port range: *

destination: any

destination port range: 4040

action: allow

on my VM I have run netstat -ano and got the following result:

prto | local address | foreign address| state| PID

TCP | 0.0.0.0:4040 | 0.0.0.0:0 | listening | 4

things I have tried:

- delete the rule and re created it

- increased the priority level of the group, added source IP

- disabled the firewall on the VM and tested with a different port number and still connection time out

- changed the protocol to TCP

other notes:

- I can browse successfully to the open port using the VM local IP address (connect to site to site VPN), the issue is when using the public IP address.

- all other rules work with both public and internal IP, all rules have been created the same way.

hope I covered everything in this initial post.

thanks


Viewing all articles
Browse latest Browse all 6513

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>