Subnets should be associated with a Network Security Group
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Description
Protect subnet resources by filtering inbound and outbound traffic with Network Security Group (NSG) rules. Subnets without an associated NSG expose workloads to unauthorized network access. Special-purpose subnets that cannot have NSGs attached (GatewaySubnet, AzureFirewallSubnet, AzureFirewallManagementSubnet, AzureBastionSubnet, RouteServerSubnet) are excluded from this check.
Associate a Network Security Group with the subnet by navigating to the virtual network’s Subnets blade in the Azure portal, selecting the target subnet, and choosing an NSG under the Security section. For detailed steps, see Associate or dissociate a network security group to or from a subnet.