@@ -40,18 +40,18 @@ You can limit outbound internet access from the CycleCloud VM by configuring a s
40
40
41
41
1 . Add the following NSG Outbound rule to * Deny* outbound access by default using the "** Internet** " destination Service Tag:
42
42
43
- | Priority | Name | Port | Protocol | Source | Destination | Action |
44
- | ----------- | ----------------- | ---------- | -------- | -------- | -------------- | ------ |
45
- | 4000 | BlockOutbound | Any | Any | Any | Internet | Deny |
43
+ | Priority | Name | Port | Protocol | Source | Destination | Action |
44
+ | ----------- | ----------------- | ---------- | -------- | -------- | -------------- | ------ |
45
+ | 4000 | BlockOutbound | Any | Any | Any | Internet | Deny |
46
46
47
47
1 . Add the following NSG Outbound rules to * Allow* outbound access to the required Azure services by destination Service Tag:
48
48
49
- | Priority | Name | Port | Protocol | Source | Destination | Action |
50
- | ----------- | -------------------- | ---------- | -------- | -------- | -------------------- | ------ |
51
- | 100 | AllowAzureStorage | 443 | TCP | Any | Storage | Allow |
52
- | 101 | AllowActiveDirectory | 443 | TCP | Any | AzureActiveDirectory | Allow |
53
- | 102 | AllowAzureMonitor | 443 | TCP | Any | AzureMonitor | Allow |
54
- | 103 | AllowAzureRM | 443 | TCP | Any | AzureResourceManager | Allow |
49
+ | Priority | Name | Port | Protocol | Source | Destination | Action |
50
+ | ----------- | -------------------- | ---------- | -------- | -------- | -------------------- | ------ |
51
+ | 100 | AllowAzureStorage | 443 | TCP | Any | Storage | Allow |
52
+ | 101 | AllowActiveDirectory | 443 | TCP | Any | AzureActiveDirectory | Allow |
53
+ | 102 | AllowAzureMonitor | 443 | TCP | Any | AzureMonitor | Allow |
54
+ | 103 | AllowAzureRM | 443 | TCP | Any | AzureResourceManager | Allow |
55
55
56
56
## Internal communications between cluster nodes and CycleCloud
57
57
0 commit comments