With NSGs, administrators can control and filter incoming and outgoing traffic to Virtual resources. When you attach NSGs to servers or NICs, you can enforce granular security policies by restricting access to specific servers or NICs to secure your network from malicious activity, unauthorized access, and security threats.
Reviewing your configuration is vital to ensure it meets changing security requirements.
Prerequisite: Ensure that the NSGs are configured with appropriate firewall or template rules.
To attach an NSG to a server or NIC, follow these steps:
1. Log in to the DCD with your username and password.
2. Go to Menu > Network > Network Security Groups.
3. Select the checkbox(es) to associate the chosen NSG(s) with a server or an NIC.
4. Select Attach NSG to.
5. Select one of the following in the Attach Network Security Groups pop-up window:
Select the target VM or NIC:
Server: Select a server from the drop-down list. The list contains the servers that you have configured in the respective data center. Upon selection, the chosen NSG(s) are automatically configured for all the NICs associated with the corresponding server.
NIC: Select an NIC from the drop-down list. The list contains the NICs that are associated with the respective data center. The selected NSG(s) are associated with the selected NIC upon selection. It is beneficial for granular control, where you can apply NSGs to individual VMs or NICs requiring unique security configurations.
What action should be taken with the selected Network Security Groups?
Add selected security groups without affecting any existing ones: Select the option to add the selected NSGs without affecting the existing NSGs.
Replace any existing security groups with the selected ones: Select the option to replace the existing NSGs with the selected NSGs. All the rules of the chosen server or the NIC will be overriden with the rules of the new NSGs.
Result: The selected security group(s) is associated with the selected server or the NIC.