Welcome to ShenZhenJia Knowledge Sharing Community for programmer and developer-Open, Learning and Share
menu search
person
Welcome To Ask or Share your Answers For Others

Categories

I have one Service Fabric application deployed in one Azure Service Fabric cluster, which provide some REST API, and also a web app in Azure, acting as the consumer of the REST API. What I want to do is to deny any access to my SF application from anywhere except from my web app.

I tried NSG to add the deny rule for source with the tag of Internet but failed. Seems the existence of the load balancer of SF cluster make the deny rule not working. Any suggestion? Thanks!

See Question&Answers more detail:os

与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…
thumb_up_alt 0 like thumb_down_alt 0 dislike
247 views
Welcome To Ask or Share your Answers For Others

1 Answer

This works for me:

  1. Add an inbound NSG rule, priority lower than the default rules (say 100)
  2. Name: Give it a name
  3. Source: Any
  4. Protocol: TCP Source
  5. port range: (web app addresses)
  6. Destination: Any
  7. Destination port range: *
  8. Action: Deny (was incorrectly set to Allow before)

I suspect either the INTERNET tag's range is too broad to block anything, or your rule priority # is too high.

Check here to find out Azure DC port ranges.


与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…
thumb_up_alt 0 like thumb_down_alt 0 dislike
Welcome to ShenZhenJia Knowledge Sharing Community for programmer and developer-Open, Learning and Share

548k questions

547k answers

4 comments

86.3k users

...