Hi, This is the default behaviour in Azure as when you deploy a VM without public IP, you can still get access to internet via Azure platform. But that is only for outbound. From Internet, your VM will not be accessible. If you don't want outbound traffic to reach internet, you can use NSG to block it or deploy services like Azure Firewall to restrict outbound traffic.
VMs getting connect to Internet without having Public IP or NAT gateway
I have created VM with out assigning Public IP or NAT Gateway.
just in NSG out bound it has 0.0.0.0/0 . which allowing the VM to communicate on internet without public IP, which big risk. Please suggest on it. And I don't want to block out bound 0.0.0.0/0 . As I need to perform some test with AZURE and AWS .
Just checking in to see if the below answer helped. If this answers your query, please don’t forget to click "Accept the answer" which might be beneficial to other community members reading this thread. And, if you have any further query do let us know.
Sign in to comment