SonicOS 7 NSv Getting Started Guide for Azure
- SonicOS NSv 7
- Introducing the NSv Series
- Installing SonicOS on the NSv Series
- Licensing and Registering Your NSv
- SonicOS Management
- Using the Virtual Console and SafeMode
- SonicWall Support
Viewing and Configuring Security Rules
On the Dashboard page or the Resource group page, click the NSG link to view the inbound and outbound security rules. The NSG link has a description or type of Network security group.
The inbound rules control management access to the NSv. The Source for these rules is initially set to your public IP address, that you entered during the installation process for Management Access IP Source. To manage the NSv from another location, you need to add an inbound rule.
To add a new inbound rule for NSv HTTPS management access from another public IP address
-
Click Inbound security rules in the left navigation pane of the Azure NSG page. The Inbound security rules page displays.
-
Click Add. The Add inbound security rule dialog appears.
-
For Source, select IP Addresses.
-
For Source IP addresses/CIDR ranges, type in your new public IP address or an address range in CIDR format.
-
Optionally fill in Source port ranges if you want to specify the port(s).
-
For Destination, select Any.
-
For Destination port ranges, type in 443 for HTTPS access.
-
For Protocol, select TCP.
-
For Action, select Allow.
-
For Priority, type in an available number that is less than (higher priority than) the number for the first Deny rule.
-
For Name, type in a descriptive name for this rule.
-
Optionally fill in the Description field.
-
Click Add.
Was This Article Helpful?
Help us to improve our support portal