I am trying to configure my Azure VM to only allow connections on say ftp/sFPT from specific IP-addresses, but I seem to be completely unable to find out if this is at all possible.
I am able to create the endpoint, thus effectively opening the firewall, but I would not allow everyone to connect, just one or two specific IP's
You can use the Network Security Groups(NSG) to block some IPs. You can add different rules in one NSG and config this NSG to your cloud service's VNet. Firstly, you need to have a NSG with rules that can block the target IPs. You can use portal to create the NSG and add rules in it.
Determine subnet size Azure uses five IP addresses in the subnet for its own needs. Each virtual cluster allocates an additional number of addresses.
An Azure Private link DNS zone has been configured to handle Azure DNS (this helps Azure switch the DNS response from the default public IP, back to a private IP owned by the endpoint, based on the source of the request – a private endpoint doesn't mean you can't use a public at the same time), to note, my VM's in ...
Old question, I know but still in the search results - and things have changed since the only other answer here.
You can edit the Access Control List via the Azure Management Dashboard: Virtual Machines -> select vm -> Endpoints -> select endpoint -> Manage ACL
or the Preview Portal: Select vm -> All settings -> Endpoints -> select endpoint
Enter the name for the ACL entry, "Permit" for action and then enter the CIDR notation for the IP Address sub range you want to allow. In this case a single IP address of 1.2.3.4 will require an entry of 1.2.3.4/32 and another entry to cover your second (and subsequent IP addresses unless they are contiguous and you can define a range).
Having this permit entry will create an implied Deny to 0.0.0.0/0 (which is deny access for everyone - but only after allowing access for your IP address)
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With