Firewall – Cannot access to any port of Azure VM except RD (3389) even when inbound rules are defined

azurefirewallport

I have HTTP port 80 opened in Windows firewall and also configured inbound rules of NSG to allow port 80. Still I can't telnet port 80. Only RDP port 3389 works..

Any help is appreciated… Thanks a lot..

NSG inbound rules
Windows Firewall

Best Answer

Normally, add port 80 to NSG inbound rules and open port in windows firewall inbound rules (for test we can turn off VM's windows firewall), we will access website from outside.
In your scenario, maybe we should check web site work on IPv4 or IPv6 or both? We can use this command to check it:

C:\Users\jason>netstat -ant
Active Connections

  Proto  Local Address          Foreign Address        State           Offload State

  TCP    0.0.0.0:80             0.0.0.0:0              LISTENING       InHost
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       InHost
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       InHost
  TCP    0.0.0.0:3389           0.0.0.0:0              LISTENING       InHost
  TCP    [::]:80                [::]:0                 LISTENING       InHost
  TCP    [::]:135               [::]:0                 LISTENING       InHost
  TCP    [::]:445               [::]:0                 LISTENING       InHost
  TCP    [::]:3389              [::]:0                 LISTENING       InHost

We can find web service listen on port 80 and work on IPv4 and IPv6, so we can use IPv4(public IP address) and port 80 to access this web site.

We should make sure web service work on IPv4.

By the way, we should check your Vnet-->subnet, does this subnet associated with a NSG, if yes, we should modify this NSG's inbound rules, add port 80 to this NSG.

Related Topic