{"id":6418,"date":"2022-12-01T02:10:01","date_gmt":"2022-12-01T02:10:01","guid":{"rendered":"https:\/\/pariswells.com\/blog\/?p=6418"},"modified":"2022-12-01T02:10:45","modified_gmt":"2022-12-01T02:10:45","slug":"how-to-block-ports-on-azure-vpn-gateway-with-azure-firewall","status":"publish","type":"post","link":"https:\/\/pariswells.com\/blog\/research\/how-to-block-ports-on-azure-vpn-gateway-with-azure-firewall","title":{"rendered":"How to Block Ports on Azure VPN Gateway with Azure firewall"},"content":{"rendered":"\n<p>Recently setup a Site to Site ( S2S ) Connection into a VNET of an Azure Tenant<\/p>\n\n\n\n<p>By Default the existing Network security group attached to the VNET allows VirtualNetwork Traffic ( Any &lt;-&gt; Any ) <\/p>\n\n\n\n<p>Virtual Network Gateway is Include in this Virtual Network Traffic<\/p>\n\n\n\n<p>I needed to Limit the Inbound Ports allowed across this Gateway <\/p>\n\n\n\n<p>As there is no NAT performed , I can target the Subnet or Subnets  of the source Connection ( in this case 10.0.0.0\/24) and enable 2 Deny rules for the two servers in the Vnet <\/p>\n\n\n\n<p>I then created two allow rules above it for the traffic needed to Pass.<\/p>\n\n\n\n<p>You can replicate the same setup for Outbound<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2022\/12\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"130\" src=\"https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2022\/12\/image-1024x130.png\" alt=\"\" class=\"wp-image-6419 img-responsive\" srcset=\"https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2022\/12\/image-1024x130.png 1024w, https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2022\/12\/image-300x38.png 300w, https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2022\/12\/image-768x98.png 768w, https:\/\/pariswells.com\/blog\/wp-content\/uploads\/2022\/12\/image.png 1289w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Recently setup a Site to Site ( S2S ) Connection into a VNET of an Azure Tenant By Default the existing Network security group attached to the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1464,4100,2547,4101,1534,4099],"class_list":["post-6418","post","type-post","status-publish","format-standard","hentry","category-research","tag-azure","tag-block-ports","tag-firewall","tag-limit-traffic","tag-ports","tag-vpn-gateway"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/6418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/comments?post=6418"}],"version-history":[{"count":2,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/6418\/revisions"}],"predecessor-version":[{"id":6421,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/6418\/revisions\/6421"}],"wp:attachment":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/media?parent=6418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/categories?post=6418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/tags?post=6418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}