Networking

The Networking forum covers all aspects of Networking in Azure, including endpoints, load-balancing, network security, DNS, Traffic Manager, virtual networks, and external connectivity.

Virtual Network:

  • Service overview

  • Technical documentation

  • Pricing details
  • Traffic Manager:

  • Service overview

  • Technical documentation

  • Pricing details
  • Network Watcher:

  • Service overview

  • Technical documentation

  • Pricing details
  • If you have any feedback on any aspect of Azure relating to Networking, we’d love to hear it.

    • Hot ideas
    • Top ideas
    • New ideas
    • My feedback
    1. Please raise the Endpoint ACL Limitation

      Please raise the maximum number of Endpoint ACL limitation so we can set over 50 rules.
      As you know, we can set 400 rules in NSG.

      - Japanese
      エンドポイント ACL の最大数を 50 個以上設定できるようにしてほしい

      16 votes
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      1 comment  ·  Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    2. Managing allowed IP-adress possible with a time-out.

      Adding an IP-adress to allow connections, which will be removed after 24hrs for instance.

      6 votes
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    3. virtual machine scale sets NSG support

      Virtual machine scale sets (VMSS) do not have any feature which can allow blocking certain IP addresses from accessing it via load balancer. It would be great to have network security group support for VMSS to allow blocking unwanted traffic from the internet.

      3 votes
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      1 comment  ·  Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    4. allow domains and wildcards in Network Security Groups

      Network Security Groups only allow us to use specific resources, tags, and IP ranges. Many APIs and other tools add/remove/change IP ranges regularly, given that clients are expected to point to the domain endpoint (e.g. smtp.gmail.com, Slack API webhooks, etc.).

      If we have to get new IP ranges and add them to NSGs, it creates an extra task. We should be able to use domain names/FQDNs/etc. with wildcards (e.g. *.gmail.com, *.slack.com) for NSG allow or deny rules so we have one less administrative task.

      3 votes
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    • Don't see your idea?

    Feedback and Knowledge Base