You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Required. Start your H1 with a verb. Pick an H1 that clearly conveys the task the
27
-
user will complete.
28
-
-->
29
-
30
17
# How to block high-risk network ports with Security Admin Rules in Azure Virtual Network Manager
31
18
32
-
<!-- 2. Introductory paragraph
33
-
Required. Lead with a light intro that describes, in customer-friendly language,
34
-
what the customer will learn, or do, or accomplish. Answer the fundamental “why
35
-
would I want to do this?” question. Keep it short.
36
-
-->
37
19
38
-
In this article, you will learn to block high risk network ports using Azure Virtual Network Manager and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your vnets with network groups, and create & deploy security admin configurations for your orginization. You'll deploy an general block rule for high risk ports. Then you'll create an exception for managing a specific application's vnet. This is will allow you to manage access to the application vnets using network security groups.
20
+
In this article, you will learn to block high risk network ports using Azure Virtual Network Manager and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with network groups, and create & deploy security admin configurations for your organization. You'll deploy an general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet. This is will allow you to manage access to the application VNets using network security groups.
39
21
40
22
### Describe Scenario
41
23
@@ -49,10 +31,22 @@ In this article, you will learn to block high risk network ports using Azure Vir
49
31
* You understand how to
50
32
* You understand each element in a [Security admin rule](concept-security-admins.md).
51
33
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
34
+
* A group of virtual networks that can be split into
For this How-to, you will need a virtual network environment that includes production and test virtual networks. For the this, you may use the following table or your own configuration of virtual networks:
You will deploy a virtual network environment that includes production and test virtual networks.
55
48
49
+
Not sure how to build a virtual network? Learn more in [Quickstart: Create a virtual network using the Azure portal](quick-create-portal.md).
56
50
57
51
## Create a Virtual Network Manager
58
52
In this section, you will deploy a Virtual Network Manager instance with the Security admin feature in your organization.
@@ -74,15 +68,19 @@ In this section, you will deploy a Virtual Network Manager instance with the Sec
74
68
|[Features](concept-network-manager-scope.md#features)| Select the features you want to enable for Azure Virtual Network Manager. Available features are *Connectivity*, *SecurityAdmin*, or *Select All*. </br> Connectivity - Enables the ability to create a full mesh or hub and spoke network topology between virtual networks within the scope. </br> SecurityAdmin - Enables the ability to create global network security rules. |
75
69
76
70
1. Select **Review + create** and then select **Create** once validation has passed.
71
+
1. Select **Go to resource** when deployment is complete and review the virtual network manager configuration
77
72
78
73
## Create a Network Group
79
-
With your virtual network manager created, you now create a network group to encapsulate the VNets you want to protect. This will include all of the VNets in the organization as a general all-encompassing rule to block high risk network ports is needed.
80
-
1.<!-- Step 1 -->
81
-
1.<!-- Step 2 -->
82
-
1.<!-- Step n -->
74
+
With your virtual network manager created, you now create a network group to encapsulate the VNets you want to protect. This will include all of the VNets in the organization as a general all-encompassing rule to block high risk network ports is needed. You will manually add all of the VNets.
75
+
1. Select **Network Groups**, under **Settings**.
76
+
1. Select **+ Create**, enter a *name* for the network group, and select **Add**.
77
+
1. On the *Network groups* page, select the network group you created.
78
+
1. Select **Add**, under **Static Membership** to manually add all the VNets.
79
+
1. On the **Add static members** page, select all of the virtual networks you wish to include, and select **Add**.
83
80
84
81
## Create a Security Admin Configuration
85
82
It’s time to construct our security admin rules within a configuration so that we can apply those rules to all the VNets within OurNetworkGroup at once. Create rules for all of your high risk ports. In this section, you'll add rules for SSH, FTP, and HTTP.
83
+
1. Return to your virtual network manager resource.
86
84
1. Select **Configurations** under *Settings* and then select **+ Create**.
87
85
88
86
:::image type="content" source="./media/create-virtual-network-manager-portal/add-configuration.png" alt-text="Screenshot of add a security admin configuration.":::
@@ -97,13 +95,15 @@ It’s time to construct our security admin rules within a configuration so that
97
95
98
96
## Add a rule collection
99
97
100
-
1. Enter a *Name* to identify this rule collection and then select the *Target network groups* you want to apply the set of rules to.
98
+
1. Select **+ Add** from the *Add a security configuration page*.
99
+
100
+
1. Enter a *Name* to identify this rule collection and then select the *Target network groups* you want to apply the set of rules to. The target group will be the network group containing all of your virtual networks.
101
101
102
102
:::image type="content" source="./media/how-to-block-network-traffic-portal/rule-collection-target.png" alt-text="Screenshot of rule collection name and target network groups.":::
103
103
104
104
## Add a security rule
105
105
106
-
1. Select **+ Add**from the *Add a rule collection page*.
:::image type="content" source="./media/how-to-block-network-traffic-portal/add-rule-button.png" alt-text="Screenshot of add a rule button.":::
109
109
@@ -151,28 +151,38 @@ If you just created a new security admin configuration, make sure to deploy this
151
151
:::image type="content" source="./media/how-to-block-network-traffic-portal/deploy-security-configuration.png" alt-text="Screenshot of deploy a security configuration page.":::
152
152
153
153
1. Select **Next** and **Deploy** to deploy the security admin configuration.
154
-
## Create a Network Group for traffic exceptions for allowed application traffic
155
-
We need to create a network group specifically for the Application 1 team’s VNets so that we can create security admin rules that pertain only to Application 1’s VNets and allow them to handle SSH traffic through their own NSGs. Since we already have OurNetworkManager created, we can go ahead and create another network group.
154
+
## Create a Network Group for exception virtual networks
155
+
With traffic blocked across all of your VNets, you need an exception to allow traffic to your application virtual networks. To do this, you will create a network group specifically for the application VNets and deploy a security admin rule allowing SSH traffic to application resources.
156
+
157
+
1. From your virtual network manager, select **Network Groups**, under **Settings**.
158
+
1. Select **+ Create**, enter a *name* for the application network group, and select **Add**.
159
+
1. Under **Define Dynamic Membership**, select **Define**.
160
+
1. Enter or select the values to allow traffic to your application virtual network.
161
+
1. Select **Preview Resources** to review the **Effective Virtuals Networks** included, and select **Close**.
162
+
1. Select **Save**.
156
163
157
164
## Create a Security Admin Rule Collection for Application 1
158
165
We can now create an exception for Application 1’s VNets by adding a new rule collection and security admin rule to our existing security admin configuration.
159
166
167
+
> [!Important]
168
+
> In order for your security admin rule to allow traffic to your application virtual networks, the priority needs to be set to a **lower number** than existing rules blocking traffic.
169
+
>
170
+
>For example, an all network rule blocking **SSH** has a priority of **10** so your allow rule should have a priority from **1 to 9**.
171
+
1. From your virtual network manager, select **Configurations** and select your security configuration.
172
+
1. Select **Rule collections** under **Settings**, then select **+ Create** to create a new rule collection.
173
+
1. On the **Add a rule collection page**, enter a name for your application rule collection and choose the application network group you created.
174
+
1. Under the **Security admin rules**, select + Add.
175
+
1. Enter or select the values to allow specific network traffic to your application network group, and select **add** when completed.
176
+
177
+
1. Repeat the add rule process for all traffic needing an exception.
178
+
1. Select **Save** when you are done.
160
179
## Re-deploy the Security Admin Configuration
161
180
We’re at the final step, which is to redeploy OurSecurityConfig since we’ve modified this configuration by adding a rule collection.
162
181
163
-
164
-
## Verify security admin rules
165
-
166
-
Go to the **Networking** settings for a virtual machine in the one of the virtual networks you applied the security admin rules to. If you don't have one, deploy a test virtual machine into one of the virtual networks. You'll now see a new section below the network security group rules about security rules applied by Azure Virtual Network Manager.
167
-
168
-
:::image type="content" source="./media/how-to-block-network-traffic-portal/vm-security-rules.png" alt-text="Screenshot of security admin rules under virtual machine network settings." lightbox="./media/how-to-block-network-traffic-portal/vm-security-rules-expanded.png":::
169
-
170
-
## Clean up
171
-
172
-
<!-- 5. Next steps
173
-
Required. Provide at least one next step and no more than three. Include some
174
-
context so the customer can determine why they would click the link.
175
-
-->
182
+
1. From your virtual network manager, select **Configurations**.
183
+
1. Select your security admin configuration and select **Deploy**
184
+
1. On the **Deploy Configuration** page, select all target regions receiving the deployment and
185
+
1. Select **Next** and **Deploy**.
176
186
177
187
## Next steps
178
188
<!-- Add a context sentence for the following links -->
0 commit comments