On the myNsg blade, in the Settings section, click Inbound security rules.
Review the default inbound security rules and then click + Add.
On the Add inbound security rule blade, specify the following settings to allow TCP ports 80 and 443 to the myAsgWebServers application security group (leave all other values with their default values):
| Setting | Value |
|---|---|
| Destination | in the drop-down list, select Application security group and then click myAsgWebServers |
| Destination port ranges | 80,443 |
| Protocol | TCP |
| Priority | 100 |
| Name | Allow-Web-All |
On the Add inbound security rule blade, click Add to create the new inbound rule.
On the myNsg blade, in the Settings section, click Inbound security rules, and then click + Add.
On the Add inbound security rule blade, specify the following settings to allow the RDP port (TCP 3389) to the myAsgMgmtServers application security group (leave all other values with their default values):
| Setting | Value |
|---|---|
| Destination | in the drop-down list, select Application security group and then click myAsgMgmtServers |
| Destination port ranges | 3389 |
| Protocol | TCP |
| Priority | 110 |
| Name | Allow-RDP-All |
On the Add inbound security rule blade, click Add to create the new inbound rule.
Result: You have deployed a virtual network, network security with inbound security rules, and two application security groups.