|
1 | 1 | ---
|
2 |
| -title: 'Azure Active Directory Domain Services: Troubleshoot network security groups | Microsoft Docs' |
3 |
| -description: Troubleshooting network security group configuration for Azure AD Domain Services |
| 2 | +title: Resolve network security group alerts in Azure AD DS | Microsoft Docs |
| 3 | +description: Learn how to troubleshoot and resolve network security group configuration alerts for Azure Active Directory Domain Services |
4 | 4 | services: active-directory-ds
|
5 |
| -documentationcenter: '' |
6 | 5 | author: iainfoulds
|
7 |
| -manager: |
8 |
| -editor: |
| 6 | +manager: daveba |
9 | 7 |
|
10 | 8 | ms.assetid: 95f970a7-5867-4108-a87e-471fa0910b8c
|
11 | 9 | ms.service: active-directory
|
12 | 10 | ms.subservice: domain-services
|
13 | 11 | ms.workload: identity
|
14 |
| -ms.tgt_pltfrm: na |
15 |
| -ms.devlang: na |
16 |
| -ms.topic: article |
17 |
| -ms.date: 05/22/2019 |
| 12 | +ms.topic: troubleshooting |
| 13 | +ms.date: 09/19/2019 |
18 | 14 | ms.author: iainfou
|
19 | 15 |
|
20 | 16 | ---
|
21 |
| -# Troubleshoot invalid networking configuration for your managed domain |
22 |
| -This article helps you troubleshoot and resolve network-related configuration errors that result in the following alert message: |
| 17 | +# Known issues: Network configuration alerts in Azure Active Directory Domain Services |
| 18 | + |
| 19 | +To let applications and services correctly communicate with Azure Active Directory Domain Services (Azure AD DS), specific network ports must be open to allow traffic to flow. In Azure, you control the flow of traffic using network security groups. The health status of an Azure AD DS managed domain shows an alert if the required network security group rules aren't in place. |
| 20 | + |
| 21 | +This article helps you understand and resolve common alerts for network security group configuration issues. |
23 | 22 |
|
24 | 23 | ## Alert AADDS104: Network error
|
25 |
| -**Alert message:** |
26 |
| - *Microsoft is unable to reach the domain controllers for this managed domain. This may happen if a network security group (NSG) configured on your virtual network blocks access to the managed domain. Another possible reason is if there is a user-defined route that blocks incoming traffic from the internet.* |
27 | 24 |
|
28 |
| -Invalid NSG configurations are the most common cause of network errors for Azure AD Domain Services. The Network Security Group (NSG) configured for your virtual network must allow access to [specific ports](network-considerations.md#network-security-groups-and-required-ports). If these ports are blocked, Microsoft cannot monitor or update your managed domain. Additionally, synchronization between your Azure AD directory and your managed domain is impacted. While creating your NSG, keep these ports open to avoid interruption in service. |
| 25 | +### Alert message |
| 26 | + |
| 27 | +*Microsoft is unable to reach the domain controllers for this managed domain. This may happen if a network security group (NSG) configured on your virtual network blocks access to the managed domain. Another possible reason is if there is a user-defined route that blocks incoming traffic from the internet.* |
| 28 | + |
| 29 | +Invalid network security group rules are the most common cause of network errors for Azure AD DS. The network security group for the virtual network must allow access to specific ports and protocols. If these ports are blocked, the Azure platform can't monitor or update the managed domain. The synchronization between the Azure AD directory and Azure AD DS managed domain is also impacted. Make sure you keep the default ports open to avoid interruption in service. |
29 | 30 |
|
30 |
| -### Checking your NSG for compliance |
| 31 | +## Default security rules |
31 | 32 |
|
32 |
| -1. Navigate to the [Network security groups](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.Network%2FNetworkSecurityGroups) page in the Azure portal |
33 |
| -2. From the table, choose the NSG associated with the subnet in which your managed domain is enabled. |
34 |
| -3. Under **Settings** in the left-hand panel, click **Inbound security rules** |
35 |
| -4. Review the rules in place and identify which rules are blocking access to [these ports](network-considerations.md#network-security-groups-and-required-ports) |
36 |
| -5. Edit the NSG to ensure compliance by either deleting the rule, adding a rule, or creating a new NSG entirely. Steps to [add a rule](#add-a-rule-to-a-network-security-group-using-the-azure-portal) or create a new, compliant NSG are below |
| 33 | +The following default inbound and outbound security rules are applied to the network security group for an Azure AD DS managed domain. These rules keep Azure AD DS secure and allow the Azure platform to monitor, manage, and update the managed domain. You may also have an additional rule that allows inbound traffic if you [configure secure LDAP][configure-ldaps]. |
37 | 34 |
|
38 |
| -## Sample NSG |
39 |
| -The following table depicts a sample NSG that would keep your managed domain secure while allowing Microsoft to monitor, manage, and update information. |
| 35 | +### Inbound security rules |
40 | 36 |
|
41 |
| - |
| 37 | +| Priority | Name | Port | Protocol | Source | Destination | Action | |
| 38 | +|----------|------|------|----------|--------|-------------|--------| |
| 39 | +| 101 | AllowSyncWithAzureAD | 443 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | |
| 40 | +| 201 | AllowRD | 3389 | TCP | CorpNetSaw | Any | Allow | |
| 41 | +| 301 | AllowPSRemoting | 5986| TCP | AzureActiveDirectoryDomainServices | Any | Allow | |
| 42 | +| 65000 | AllVnetInBound | Any | Any | VirtualNetwork | VirtualNetwork | Allow | |
| 43 | +| 65001 | AllowAzureLoadBalancerInBound | Any | Any | AzureLoadBalancer | Any | Allow | |
| 44 | +| 65500 | DenyAllInBound | Any | Any | Any | Any | Deny | |
| 45 | + |
| 46 | +### Outbound security rules |
| 47 | + |
| 48 | +| Priority | Name | Port | Protocol | Source | Destination | Action | |
| 49 | +|----------|------|------|----------|--------|-------------|--------| |
| 50 | +| 65000 | AllVnetOutBound | Any | Any | VirtualNetwork | VirtualNetwork | Allow | |
| 51 | +| 65001 | AllowAzureLoadBalancerOutBound | Any | Any | Any | Internet | Allow | |
| 52 | +| 65500 | DenyAllOutBound | Any | Any | Any | Any | Deny | |
42 | 53 |
|
43 | 54 | >[!NOTE]
|
44 |
| -> Azure AD Domain Services requires unrestricted outbound access from the virtual network. We recommend not to create any additional NSG rule that restricts outbound access for the virtual network. |
| 55 | +> Azure AD DS needs unrestricted outbound access from the virtual network. We don't recommend that you create any additional rules that restrict outbound access for the virtual network. |
| 56 | +
|
| 57 | +## Verify and edit existing security rules |
| 58 | + |
| 59 | +To verify the existing security rules and make sure the default ports are open, complete the following steps: |
| 60 | + |
| 61 | +1. In the Azure portal, search for and select **Network security groups**. |
| 62 | +1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*. |
| 63 | +1. On the **Overview** page, the existing inbound and outbound security rules are shown. |
| 64 | + |
| 65 | + Review the inbound and outbound rules and compare to the list of required rules in the previous section. If needed, select and then delete any custom rules that block required traffic. If any of the required rules are missing, add a rule in the next section. |
| 66 | + |
| 67 | + After you add or delete rules to allow the required traffic, the Azure AD DS managed domain's health automatically updates itself within two hours and removes the alert. |
| 68 | + |
| 69 | +### Add a security rule |
| 70 | + |
| 71 | +To add a missing security rule, complete the following steps: |
| 72 | + |
| 73 | +1. In the Azure portal, search for and select **Network security groups**. |
| 74 | +1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*. |
| 75 | +1. Under **Settings** in the left-hand panel, click *Inbound security rules* or *Outbound security rules* depending on which rule you need to add. |
| 76 | +1. Select **Add**, then create the required rule based on the port, protocol, direction, etc. When ready, select **OK**. |
45 | 77 |
|
46 |
| -## Add a rule to a Network Security Group using the Azure portal |
47 |
| -If you do not want to use PowerShell, you can manually add single rules to NSGs using the Azure portal. To create rules in your Network security group, complete the following steps: |
| 78 | +It takes a few moments for the security rule to be added and show in the list. |
48 | 79 |
|
49 |
| -1. Navigate to the [Network security groups](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.Network%2FNetworkSecurityGroups) page in the Azure portal. |
50 |
| -2. From the table, choose the NSG associated with the subnet in which your managed domain is enabled. |
51 |
| -3. Under **Settings** in the left-hand panel, click either **Inbound security rules** or **Outbound security rules**. |
52 |
| -4. Create the rule by clicking **Add** and filling in the information. Click **OK**. |
53 |
| -5. Verify your rule has been created by locating it in the rules table. |
| 80 | +## Next steps |
54 | 81 |
|
| 82 | +If you still have issues, [open an Azure support request][azure-support] for additional troubleshooting assistance. |
55 | 83 |
|
56 |
| -## Need help? |
57 |
| -Contact the Azure Active Directory Domain Services product team to [share feedback or for support](contact-us.md). |
| 84 | +<!-- INTERNAL LINKS --> |
| 85 | +[azure-support]: ../active-directory/fundamentals/active-directory-troubleshooting-support-howto.md |
| 86 | +[configure-ldaps]: tutorial-configure-ldaps.md |
0 commit comments