Recently, Azure VMs got endpoint ACLs — this is a great addition and one of the biggest things I missed from AWS’ security groups. Using them on VMs is great and all, but what about cloud services? Since VMs are instances within a cloud service, it’s certainly possible, but how can we configure them as such? Fortunately it’s pretty easy.
No soup
First you’ll need to snag Azure SDK v2.3 and make sure your ServiceConfiguration.<env>.cscfg
is at the latest schema (as of today, that’s 2014–01.2.3).
Head on in to ServiceConfiguration.Cloud.cscfg — these restrictions are obviously cloud-only — and add your chunk of config. Intellisense should pick this up and make it much simpler.
What’s nice is you can define your rules in total under AccessControls, then assign them as you need them to specific endpoints.
Here’s a sample allowing a few single IPs + a range and denying everyone else. These are executed in order, so be aware of the order tag.
<NetworkConfiguration>
<AccessControls>
<AccessControl name="DenyAllExceptDevelopment">
<Rule action="permit" description="stuff" order="100" remoteSubnet="198.51.100.194/32" />
<Rule action="permit" description="thing" order="101" remoteSubnet="192.0.2.167/32"/>
<Rule action="permit" description="biz" order="106" remoteSubnet="203.0.113.0/24"/>
<Rule action="deny" description="theinternet" order="200" remoteSubnet="0.0.0.0/0" />
</AccessControl>
</AccessControls>
<EndpointAcls>
<EndpointAcl role="AzureService.Thing.Stuff" endPoint="Endpoint1" accessControl="DenyAllExceptDevelopment" />
</EndpointAcls>
</NetworkConfiguration>