The Network Security Group (NSG) allows inbound RDP (port 6332) only from a single source IP while a deny‑all rule blocks everything else.
The customer’s outbound source IP fluctuates within a /30 range due to Azure IP masking, causing intermittent or consistent RDP failures when the source IP does not exactly match the allowed one. This explains why the /30 CIDR rule previously worked and why allowing only one IP now breaks RDP after the public IP change.
Validation Steps Taken
- Confirmed the new public IP is correctly attached to the VM and the old IP is no longer visible.
- Used Azure Run Command > RunPowerShellScript to validate:
- RDP registry settings
- Firewall rules
- Port listening state
- Remote Desktop Services status
- Verified there are no leftover references to the old public IP in VM networking.
- The VM is configured correctly for RDP on port 6332.
RDP fails due to an overly restrictive NSG inbound rule, which allows traffic from only one specific source IP, while the client source IP rotates within a /30 range after Azure NAT.
- RDP on the VM is enabled and healthy, but it is configured to use a non‑standard port
6332instead of the default3389, for historical/security reasons. - Port
3389is not listening by design, while port6332is listening on TCP and UDP, confirmed via Azure Run Command output. - The Remote Desktop Services (
TermService) is running, and the registry valuefDenyTSConnections = 0confirms RDP is enabled at the OS level.
Additionally working with customer to offline for details