Apr 19 2017 01:59 AM
We needed to access to one of our VM via RDP protocol from a customer location where RDP ports are restricted on Firewall. I searched internet for a way to map default 3389 RDP port to 443 so I can access the VM.
Everything is showing the way on the Classical Portal where there was a functionality called End Points. Endpoints were allowing you to map internal and external ports differently.
Other resources shows that doing it with Network Security Groups (NSG) not possible.
So, if you're new in Azure and started to use Azure Portal only way to map ports is to use a Load Balancer.
1. Add a new Load Balancer. And then add a new inbound NAT rule
2. Configure the nat to ponit to the VM you wish to connect. And give the port 443 as Port number.
Thats it!
Apr 20 2017 12:11 PM
Apr 20 2017 02:44 PM
Hi Kent,
In general, information can be used for any port. So 3389 is an example and can be adapted to any port mapping.
Answer to your question is: Think that you needed to connect to the system where firewall prevents you to connect default RDP port. So it is not possible to setup Remote desktop Gateway.
Regards
Apr 22 2017 02:22 AM - edited Apr 22 2017 02:29 AM
Hi huseyin
The RDP gateway provides en encrypted tunnel via 443 from the end user to RDP GW and once in your internal network port 3389 is used to connect to any machine you allowed on your internal network.
therefor you dont acutally need to do port mapping.
Any just wanted to suggest an alternate solution to your specific problem, the RDP gw can also use MFA and provide you with a more secure solution.
but nice contribution on showing port mapping in general.
kind regards
Apr 28 2018 07:58 AM
Nov 15 2018 06:28 AM
Can you not just set the DNAT rule on firewall ??