Network security group allowing through unexpected traffic

Charles Pickering 41 Reputation points
2023-06-26T18:49:36.88+00:00

I've attached a network security group to a subnet and configured the rules to only permit port 3389 from a specific subnet however, I am still able to establish an RDP connection from other subnets.

My remote networks and VPN users are connected with Tailscale. I have a Tailscale subnet router with SNAT disabled in Azure on it's own subnet and another virtual subnet for my servers. I have a Network Security Group on that servers subnet set to filter out all traffic except certain ports from my remote sites to the servers. It's also set to allow more traffic from the Tailscale subnet to the servers. User's image

Somehow I am still able to establish an RDP connection from 10.3.5.0/24 to the server in the attached subnet.

Azure Virtual Network
Azure Virtual Network
An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.
2,762 questions
{count} votes

Accepted answer
  1. TP 124.7K Reputation points Volunteer Moderator
    2023-06-26T20:14:50.6933333+00:00

    Hi Charles,

    Is 10.3.5.0/24 subnet part of the same Virtual Network as the servers subnet? If yes then the default AllowVNetInBound rule would allow the RDP traffic.

    Please run Network Watcher -- IP flow verify in the Azure portal to see which rule it says is allowing the RDP traffic to the VM.

    https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-ip-flow-verify-overview

    -TP


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.