Skip to content

Commit 7252a0e

Browse files
authored
Merge pull request #212114 from Justinha/2084979
Added required NSG rules and image
2 parents f30eb49 + 60ae1f2 commit 7252a0e

File tree

2 files changed

+10
-3
lines changed

2 files changed

+10
-3
lines changed
75.4 KB
Loading

articles/active-directory-domain-services/network-considerations.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 06/20/2022
12+
ms.date: 09/21/2022
1313
ms.author: justinha
1414

1515
---
@@ -108,14 +108,21 @@ The following sections cover network security groups and Inbound and Outbound po
108108

109109
### Inbound connectivity
110110

111-
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet your managed domain is deployed into.
111+
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet for your managed domain.
112112

113113
| Inbound port number | Protocol | Source | Destination | Action | Required | Purpose |
114114
|:-----------:|:--------:|:----------------------------------:|:-----------:|:------:|:--------:|:--------|
115115
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
116116
| 3389 | TCP | CorpNetSaw | Any | Allow | Optional | Debugging for support. |
117117

118-
An Azure standard load balancer is created that requires these rules to be place. This network security group secures Azure AD DS and is required for the managed domain to work correctly. Don't delete this network security group. The load balancer won't work correctly without it.
118+
Azure AD DS also relies on the Default Security rules AllowVnetInBound and AllowAzureLoadBalancerInBound.
119+
120+
:::image type="content" border="true" source="./media/network-considerations/nsg.png" alt-text="Screenshot of network security group rules.":::
121+
122+
The AllowVnetInBound rule allows all traffic within the VNet which allows the DCs to properly communicate and replicate as well as allow domain join and other domain services to domain members. For more information about required ports for Windows, see [Service overview and network port requirements for Windows](/troubleshoot/windows-server/networking/service-overview-and-network-port-requirements).
123+
124+
125+
The AllowAzureLoadBalancerInBound rule is also required so that the service can properly communicate over the loadbalancer to manage the DCs. This network security group secures Azure AD DS and is required for the managed domain to work correctly. Don't delete this network security group. The load balancer won't work correctly without it.
119126

120127
If needed, you can [create the required network security group and rules using Azure PowerShell](powershell-create-instance.md#create-a-network-security-group).
121128

0 commit comments

Comments
 (0)