How to Create NSG in Azure Portal? A Step-By-Step Guide
Step 1: Firstly Sign in to your Microsoft Azure Portal.Search for “Network Security Group” and click on respective.
step 2: Now, click on “Create,” fill in the details in the Azure Portal, and click on “Review + Create.” Finally, click on “Create.”
Step 3: After successfully creation of NSG click on “Go to resource”.
Step 4: To associate this NSG with a subnet or interface, click on the “Subnets” service interface from the left menu present under Settings section.
- Now, click on the “Associate” button and select a virtual network where you want to associate this NSG and click on OK.
Let’s See How The NSG Works In A Accessing Virtual Machine(VM)
Step 5: Sign in to your Microsoft Azure Portal.Search for “Virtual Machine” and click on respective.
- Click on “Create” and select “Azure Virtual Machine”.
Step 6: Enter and choose the configuration for your VM. Pick the ‘Subscription’ and ‘Resource group’ for your VM. Provide a unique name for your VM and select the ‘Region’ where you want to host it.
- Choose the number of ‘availability zones’ for your VM. The crucial step is the Image selection; in this case, we are using a ‘Windows’ image, but you can select any you prefer.
- Now, pick a ‘Size’ based on your requirements. Enter a username and password for your VM. These credentials will allow you to access your VM from anywhere. For the inbound port rule, select ‘RDP’. Finally, click on “Review+create.”
Step 7: After configuring the Virtual Machine resources, Review once the configuration of resources and Click on Create as confirmation to create the Virtual Machine.
- Take a moment to check your VM configuration, then click on “Create.”
Step 8: After creating the VM successfully, click on “Go to resource.”
- Click on “Connect” and then select “Download RDP file.”
Once connect the respective VM try on downloading the RDP File by clicking on “Download RDP file”
Step 9: Click on the file you downloaded and provide the necessary permissions. Enter your VM password and click OK.
- Congratulations! Now, in just a few seconds, you can access your VM.
Step 10: Go to the “Network Settings” of your VM and delete the Inbound rule that we made. After that, try connecting to your VM again.
- You will encounter an error message stating that you don’t have access. This happens because the NSG is restricting access.
- To regain access, we need to set up an inbound rule again. Navigate to “network settings,” click on “Create port rule,” then choose “inbound port rule.”
- Set the “Destination port ranges” to 3389, select the TCP protocol, and click on “add.”
Congratulations! Now, in just a few seconds, you can access your VM.
Azure Network Security Groups
Network Security Groups (NSG) play a crucial role in securing the virtual environment within Azure. Azure provides various services to help users secure their applications and the infrastructure that users create.
Table of Content
- What is Azure?
- What are Azure Networks?
- Traditional Server Management
- Problem in Traditional Server Management
- Network Security Groups As A Solution
- How Do Azure Network Security Groups Work?
- Azure Network Security Rules
- Default Security Rules
- Augmented Security Group Rules
- Service Tags In Azure Networks
- What Are Application Security Groups?
- How Azure Network Security Groups Filter Network Traffic?
- Best Practices For Implementing NSG in Azure
- How to Create NSG in Azure Portal? A Step-By-Step Guide
- Video Demonstration of Azure Network Security Groups with Virtual Machine
- Association of Network Security Groups
- Virtual Network And Subnet Design
- Azure Platform Considerations
- Conclusion
- Azure Network Security Groups – FAQs
Contact Us