Skip to content

Commit 5c7e6db

Browse files
committed
Azure Local Firewall minor updates
1 parent 1ee583f commit 5c7e6db

File tree

1 file changed

+9
-2
lines changed

1 file changed

+9
-2
lines changed

azure-local/concepts/firewall-requirements.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Azure Local needs to periodically connect to Azure for:
3131
- Ports 80 (HTTP) and 443 (HTTPS)
3232

3333
> [!IMPORTANT]
34-
> Azure Local doesn't support HTTPS inspection. Make sure that HTTPS inspection is disabled along your networking path for Azure Local to prevent any connectivity errors.
34+
> Azure Local doesn't support HTTPS inspection. Make sure that HTTPS inspection is disabled along your networking path for Azure Local to prevent any connectivity errors. This includes use of [Entra ID **tenant restrictions**](/entra/identity/enterprise-apps/tenant-restrictions) which is not supported for Azure Local management network communication.
3535
3636
As shown in the following diagram, Azure Local can access Azure using more than one firewall potentially.
3737

@@ -98,7 +98,6 @@ Ensure that the following firewall rules are configured in your on-premises fire
9898
>[!NOTE]
9999
> While installing Windows Admin Center, if you select the **Use WinRM over HTTPS only** setting, then port 5986 is required.
100100
101-
102101
### Active Directory
103102

104103
Ensure that the following firewall rules are configured in your on-premises firewall for Active Directory (local security authority).
@@ -107,6 +106,14 @@ Ensure that the following firewall rules are configured in your on-premises fire
107106
|:--|:--|:--|:--|:--|:--|
108107
| Allow inbound/outbound connectivity to the Active Directory Web services (ADWS) and Active Directory Management Gateway Service | Allow | Active Directory Services | Azure Local | TCP | 9389 |
109108

109+
### Network Time Protocol
110+
111+
Ensure that the following firewall rules are configured in your on-premises firewall for Network Time Protocol (NTP).
112+
113+
| Rule | Action | Source | Destination | Service | Ports |
114+
|:--|:--|:--|:--|:--|:--|
115+
| Allow inbound/outbound connectivity to the Network Time Protocol (NTP) server. This can be Active Directory domain controllers, or an NTP appliance | Allow | Azure Local | Network Time Protocol (NTP/SNTP) server | UDP | 123 |
116+
110117
### Failover Clustering
111118

112119
Ensure that the following firewall rules are configured in your on-premises firewall for Failover Clustering.

0 commit comments

Comments
 (0)